GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

Algorithm Scientist at PlatON, a Global Trustless Computing Network, Discusses Impact of Lattice-based Cryptography on Digital Asset Platforms

globalresearchsyndicate by globalresearchsyndicate
December 27, 2019
in Data Collection
0
Algorithm Scientist at PlatON, a Global Trustless Computing Network, Discusses Impact of Lattice-based Cryptography on Digital Asset Platforms
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

We recently caught up with Dr. Xiang Xie, Algorithm Scientist of PlatON, a globally accessible “trustless” computing network, which recently revealed that it co-organized and supported the second iteration of the “Crypto Innovation School” (CIS).

CIS is reportedly accredited by the International Association for Cryptologic Research (IACR). CIS was hosted in Shanghai, China from December 13-15, 2019 and was organized through a collaboration with Tsinghua University and Shanghai Jiao Tong University.

The program showcased the advancements and key insights related to the mathematical foundations of lattice-based cryptography. Dr. Xie explained how these cryptographic techniques can affect the ongoing development of digital asset platforms.

He also shared his thoughts on the current state of cryptography education initiatives across the globe.

Please tell us about the latest advancements in the mathematical foundations of lattice-based cryptography and how this could impact the development of cryptocurrency platforms.

Dr. Xiang Xie: “Modern lattice-based cryptography demonstrate a rigor in security when compared to other existing non-lattice-based cryptography systems. The security of lattice-based cryptographic systems is derived from the foundations of well-known hardness* problems in cryptography. To date, two main hardness problems have been well studied in the field, including Shortest Integer Solution (SIS) and Learning with Errors (LWE).

Informally, an SIS problem involves finding a sufficiently “short” nontrivial integer combination which sums to zero, among many uniformly random elements of a large finite additive group; whereas LWE involved a computational problem where the secret s needs to be found given a sequence of approximate random linear equations on s.

Lattice-based cryptographers today study the hardness of such algorithms and their resulting reduction, in other words, how to prove that an algorithm is provably secure. With its emphasis on hardness, lattice-based cryptography is seen as a leading contender for post-quantum cryptography.

Today, cryptocurrency platforms use lattice-based techniques in various ways. For example, fully homomorphic encryption (FHE) based on these algorithms can be used as a privacy-preserving solution, akin to those seen in privacy-oriented projects. Lattice-based signatures have also been seen as being one of the most promising solutions against quantum attacks which will be essential as we go into the future, especially when considering that most of the signature schemes in use in today’s blockchains are based on elliptic curves.

* Hardness is defined as the complexity of a given cryptographic algorithm––when an algorithm is computationally hard, it means that it cannot be solved in a reasonable amount of time.”

Please explain how cryptography has historically played an important role in how digital communication and commerce has evolved throughout the years.

Dr. Xiang Xie: “The importance of cryptography in modern-day communication systems cannot be overstated, given the role that it has historically played since World War I and World War II. Today, modern cryptography is at the very heart of digital communication and commerce as we know it today. Many businesses rely on cryptography for security, as it provides measures to ensure user privacy and data confidentiality, as well as preserving data integrity and ensuring its authenticity.

For example, the traditional and standardized secure communication mechanism, SSL/TLS protocol, is fully equipped with cryptographic primitives like key exchange, symmetric encryption, asymmetric encryption, one-way hash function, and digital signatures.

With the advent of blockchain technology, cryptography has entered the public eye as it enables greater security protections. Advanced cryptographic primitives such as multi-signature schemes, zero knowledge proofs, verifiable random functions, and many others, have been used in the industry in order to both improve the scalability as well as the security and privacy of a given network.”

You’ve mentioned that PlatON’s trustless computing architecture leverages homomorphic encryption, zero-knowledge non-interactive proofs, and multi-party computation. Please explain how these cryptographic algorithms are used by PlattON’s trustless computing network.

Dr. Xiang Xie: “Verifiable computation (VC) enables outsourced computation to be easily verified via a cryptographic proof generated from the computing party. As a trustless computing network, PlatON uses VC to achieve scalability, verifiability, and privacy.

Non-interactive zero knowledge proof is one type of VC, and provides one round of communication to reduce the communication costs from traditional verifiable proofs. Additionally, PlatON utilizes multi-party computation (MPC), which is a privacy-preserving computation technique, which enables multiple parties to collaboratively compute a function without each party’s input to the other parties. PlatON uses MPC-based smart contracts, so-called ‘privacy smart contracts’, to preserve privacy within a network where data is being shared from various sources.”

Please tell us more about PlatON’s Privacy-Preserving Computation (PPC) and Verifiable Computation and privacy-preserving encryption capabilities.

Dr. Xiang Xie: “PlatON is continuously working on researching and implementing privacy-preserving computation techniques. This includes the aforementioned MPC, as well as fully homomorphic encryption (FHE), zero-knowledge proofs (ZKPs), and many others.

To date, we have achieved various frameworks of MPC including garbled circuits, oblivious transfer (extension), verifiable secret sharing, as well as homomorphic encryption, with significant optimizations and improvements in order to allow for cutting-edge MPC schemes.

In terms of proofs, PlatON utilizes ZKPs to fulfill the privacy requirements needed for a broad range of industry applications, be it in healthcare or the financial services sector, where overt transparency is not feasible. Meanwhile, we’ve also conducted our own internal research on developments in the area of ZKPs, including zero-knowledge succinct non-interactive argument of knowledge (zk-SNARKs), zero-knowledge scalable transparent arguments of knowledge (zk-STARKs), as well as bulletproofs.”

Aside from lattice-based cryptography, what are some of the other emerging trends in the space given recent developments surrounding quantum computing?

Dr. Xiang Xie: “To resist quantum attacks, other techniques in the field continue to be proposed, including hash-based cryptography, code-based cryptography and multivariate-based cryptography, as a means of designing and developing post-quantum algorithms.

Hash-based cryptography is specifically designed to address constructions of cryptographic primitives based on the security of hash functions, while code-based cryptography pertains to cryptosystems whose security relies, partially or totally, on the hardness of decoding in a linear error correcting code. Despite such developments, lattice-based cryptography still remains the most popular candidate for post-quantum cryptography.”

Having sponsored leading cryptography conferences in the past and now co-hosting the second Cryptography Innovation School, what are your thoughts on the state of cryptography education initiatives around the world? How do they differ in China versus other countries in the west?

Dr. Xiang Xie: “I think the current state of cryptography education initiatives are much better today than they were in the past, at least when I reflect on how things were 10 years ago. At present, we’ve continued to see more and more crypto schools emerging across the globe in order to develop greater awareness of and to cultivate research and development in cryptology.

For instance, within the academic community, many crypto schools––irrespective of whether they have any affiliation to the International Association of Cryptographic Research (IACR)––have been listed in recent years on the IACR website, pointing towards how independent institutions are now gaining ground in the field.

I envision that this will only continue to increase over time as blockchain, too, continues to grow in popularity––with the help of blockchain, cryptography, as a result, has emerged as a hot topic among both technical and non-technical communities.

I would say that there are certainly differences from East to West, in terms of how cryptography has gained ground over the past few years. In China, academic papers written by local researchers have gone on to being published at top-tier industry conferences and academic journals more than ever before. Young researchers, too, are beginning to make a significant impact earlier on in their careers.

When compared to other fields of study in computer science, cryptography still remains largely under the radar, but this is changing. On local social media channels such as WeChat, you can now see public accounts that touch upon very technical cryptography topics, aimed at audiences who have a good grasp of cryptography fundamentals.

We’ve also seen more and more technical forums and events being held in the country to discuss cryptography, often crossing over with the blockchain community. In my view, it seems as though the cryptography education gap between China and its western neighbors has only decreased over time, as we now see a great deal of knowledge transfer taking place during industry events on both sides of the world.”


About Dr. Xiang Xie

Xiang Xie is the Algorithm Scientist of PlatON. Prior to joining PlatON, Dr. Xie was part of the Wireless Security Solutions Design Department at Huawei. With his experience, Dr. Xie specializes in cryptography and protocol design in areas such as lattice theory, homomorphic encryption, zero-knowledge proofs, and secure multi-party computation.

To date, Dr. Xie has published related papers at Eurocrypt, one of the world’s leading international cryptography conferences and received the Best Paper Award at Security and Cryptography for Networks – 8th International Conference, SCN 2012. Dr. Xie obtained his Bachelor’s Degree in Mathematics from China University of Mining & Technology, Beijing, and his PhD in Cryptography from the University of Chinese Academy of Sciences, Beijing.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Procurement Outsourcing Market 2020 – Industry Scenario, Strategies, Growth Factors and Forecast 2026

Glass Tableware Market 2020 - Industry Scenario, Strategies, Growth Factors and Forecast 2024

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com