Consensus Décentralisé - Blockchains - Smart Contracts - Decentralized Consensus
15.4K views | +0 today
Follow
Consensus Décentralisé - Blockchains - Smart Contracts - Decentralized Consensus
Covering Blockchain, Ethereum, Smart Contracts and Decentralized Consensus Topics at large in both english et en français.
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

MIT Media Lab’s response to "A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin" shows entanglement with MIT Technology Review around IOTA

MIT Media Lab’s response to "A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin" shows entanglement with MIT Technology Review around IOTA | Consensus Décentralisé - Blockchains - Smart Contracts - Decentralized Consensus | Scoop.it
On Friday, MIT Technology Review published an article on the cryptocurrency IOTA. However, we at the Media Lab have issues with the story. Like for « no fees transactions » : Bitcoin has miners who can perform the proof of work for you, while IOTA users do the proof of work on their own devices, per transaction. However, a Bitcoin user can also mine their own block to get their transactions accepted into the blockchain without paying fees. To put it another way, most people wouldn’t be interested in buying a refrigerator operated by a hand crank, even if the advertisement said “No electricity required!”
Philippe J DEWOST's insight:
When MIT Media Lab & MIT Technology Review differ by a Iota
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Fully homomorphic encryption, or how to perform operations over encrypted data | Orange Research blog

Fully homomorphic encryption, or how to perform operations over encrypted data | Orange Research blog | Consensus Décentralisé - Blockchains - Smart Contracts - Decentralized Consensus | Scoop.it

Can we outsource medical analysis without giving away our medical information? Can we do biometrical identification without revealing our characteristics? Can we make statistics on data that we do not know? Yes we can, thanks to a cryptographic mechanism called “homomorphic encryption”.

Cryptography has known many transformations over the years. Many centuries ago, it was first used to protect military and political communications. Though very simple, the mechanisms then devised are still the foundation of current cryptography. The introduction of the computer during Second World War considerably increased the computation capacity. This increase reflected on cryptography in the late 70’s, when public key cryptography was invented. Cryptography became a thriving scientific field. Numerous academic works were produced, commercial standards were set and cryptographic algorithms began to secure our daily life. Today, cryptography is everywhere: in our credit cards, in our phone communications, in our internet browsing, etc.
But new services are today under deployment, such as mobile services, cloud computing, BigData or IoT. These services generate and process a huge amount of personal and sensitive information. As users become more and more concerned about their privacy, and industries want to protect their sensitive data, a new challenge arises for cryptography. Indeed, if this data was to be simply encrypted, processing it would be impossible. This leaves users and service providers with a dilemma: choose between usability and confidentiality of these sensitive data. Here comes fully homomorphic encryption!

Philippe J DEWOST's insight:

Here is a fantastic "paper" by Orange Research that deciphers homomorphic encryption in a very clear way, and outlines its future and challenges.

No comment yet.