all InfoSec news
PECO: methods to enhance the privacy of DECO protocol
Dec. 31, 2022, 4:48 p.m. |
IACR News www.iacr.org
ePrint Report: PECO: methods to enhance the privacy of DECO protocol
Manuel B. Santos
The DECentralized Oracle (DECO) protocol enables the verifiable provenance of data from Transport Layer Security (TLS) connections through secure two-party computation and zero-knowledge proofs. In this paper, we present PECO, an extension of DECO that enhances privacy features through the integration of two new private three-party handshake protocols (P3P-HS). PECO allows any web user to prove to a verifier the properties of data from TLS connections …
More from www.iacr.org / IACR News
Updatable Policy-Compliant Signatures
1 day, 15 hours ago |
www.iacr.org
Guess and Determine Analysis Based on Set Split
1 day, 15 hours ago |
www.iacr.org
Improving Generic Attacks Using Exceptional Functions
1 day, 16 hours ago |
www.iacr.org
Real-Valued Somewhat-Pseudorandom Unitaries
2 days, 19 hours ago |
www.iacr.org
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
2 days, 19 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Cyber Threat Defense - PAM Manager
@ PwC | Amsterdam - Thomas R. Malthusstraat 5
InfoSec Specialist
@ Deutsche Bank | Bucharest
DevSecOps Engineer
@ Swiss Re | Bengaluru, KA, IN