Aug. 10, 2023, 6:30 a.m. |

IACR News www.iacr.org

ePrint Report: Mutator Sets and their Application to Scalable Privacy

Alan Szepieniec, Thorkil Værge


A mutator set is a cryptographic data structure for authenticating operations on a changing set of data elements called items. Informally:


- There is a short commitment to the set.
- There are succinct membership proofs for elements of the set.
- It is possible to update the commitment as well as the membership proofs with minimal effort as new items are added to the set …

alan application called changing data eprint report mutator operations privacy report

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France