Just remember that there are countless people in your life that deeply love and care for you. They know how special you are, they see the beauty of your true nature and the value that you bring to this world. They also recognise all your flaws and dysfunctional behaviours, including all the dark things that you usually lock away in the depths of your mind. Yet, they accept you fully. They make the conscious choice to be around you. …
This is the start of our Quantum Series, the aim of which is to explain a bunch of complex concepts in simple terms.
Transistors are one of the key building blocks of the computer. Due to rapid developments in the industry, transistors keep getting more efficient and compact. There is also a high degree of complexity that comes with this continuous shrinkage as we get closer to the atomic level. Eventually, we reach the limit of the world of classical physics.
Alice wants to tell Bob she’s madly in love with him. However, she’s afraid of rejection and will only put herself out there if Bob reciprocates the love that she feels for him. To save Alice from the horrible feeling of rejection, we can use multi-party computation in order to calculate if there is a match without revealing any broken hearts.
Our first step to modern romance is to create a magic black box in which Alice and Bob put their input. If they will allow themselves to succumb into love, then the input will be 1. If they are…
First thing on the menu: the Dining Cryptographers
Prepare to be served an extremely delicious cryptographic concept which illustrates an example of secure multi-party computation and anonymity.
Dining Cryptographers (DC)
The classical DC example includes three cryptographers who are enjoying a meal at a fancy restaurant. Their task is to find out whether one of them paid the bill or a third party, the NSA, paid it for them. The trick is that this information has to be revealed anonymously, without revealing the identity of the exact cryptographer who paid the bill.
Let me introduce you to our dining cryptographers…
Last year, Liza and I accidentally collided on our journey to challenge ourselves. This blog is a humble attempt to connect all of the pieces of our journey puzzle together in a meaningful way. When we took off, we were equipped with nothing but tiny backpacks filled to the brim with curiosity and determination. Picture two tiny mountain goats staring at mount Everest with wide-eyed astonishment.
The stars conveniently aligned for us as we met on the MSc Cyber Security program at Tallinn University of Technology.
Kat had an early introduction to Blockchain in her bachelors degree in Edinburgh and…
A modern day woman with a weak constitution.