Aug. 10, 2023, 6:30 a.m. |

IACR News www.iacr.org

ePrint Report: Mutator Sets and their Application to Scalable Privacy

Alan Szepieniec, Thorkil Værge


A mutator set is a cryptographic data structure for authenticating operations on a changing set of data elements called items. Informally:


- There is a short commitment to the set.
- There are succinct membership proofs for elements of the set.
- It is possible to update the commitment as well as the membership proofs with minimal effort as new items are added to the set …

alan application called changing data eprint report mutator operations privacy report

Intern, Cyber Security Vulnerability Management

@ Grab | Petaling Jaya, Malaysia

Compliance - Global Privacy Office - Associate - Bengaluru

@ Goldman Sachs | Bengaluru, Karnataka, India

Cyber Security Engineer (m/w/d) Operational Technology

@ MAN Energy Solutions | Oberhausen, DE, 46145

Armed Security Officer - Hospital

@ Allied Universal | Sun Valley, CA, United States

Governance, Risk and Compliance Officer (Africa)

@ dLocal | Lagos (Remote)

Junior Cloud DevSecOps Network Engineer

@ Accenture Federal Services | Arlington, VA