Go feature: Secret mode
Automatically erase memory to prevent secret leaks.
Really excited for the new "Secret Mode" that will land in Go v1.26 and will make operations such as key generation more secure.
antonz.org/accepted/run...
10.01.2026 11:05
👍 7
🔁 1
💬 0
📌 0
DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis
YouTube video by DEFCONConference
Very interesting talk when it comes to the SotA of Quantum Computing: www.youtube.com/watch?v=OkVY...
25.10.2025 11:28
👍 2
🔁 0
💬 0
📌 0
To maximize learning I constrained myself to only depend on the standard library and zero 3rd party dependencies.
The whole code is covered with various tests which you can use to see how the implementation can be used in practice.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
I also had to do a lot of pen-and-paper math to figure out how everything works.
I'm super happy that it's finally out there! I also learned a ton while working on this which is valuable in and of itself.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Implementing the Verifiable Timed Commitment scheme was definitely a hard nut to crack.
I started working on this late last year, but there were a lot of missing pieces I had to put in place (e.g. implement the Linearly Homomorphic Time-Lock Puzzle first).
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
One could use this in 2/2 multisigs (e.g. Payment Channels).
Before funding the multisig, we could create a signed refund transaction which is timelocked via a VTC.
The VTC can be opened after time t which allows one to refund themselves if the co-signer doesn't cooperate.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Using this, timelock capabilities can be brought to Blockchains that don't have a scripting language.
It furthermore increases privacy as no data regarding the timelock is stored on-chain (the VTC is shared off-chain).
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
This construction has various applications, but the one I'm focusing on is refund transactions.
Rather than using the Blockchain's scripting language you can share an encrypted signature over a refund transaction off-chain.
This signature can then be recovered after time t.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Verifiable timed signatures made practical | Cybersecurity Seminars
YouTube video by Monash Information Technology
The VTC implementation described in the paper is really elegant as it uses Linearly Homomorphic Time-Lock Puzzles to implement the proof via a cut-and-choose mechanism.
I highly recommend you read the paper or watch this presentation to learn more: www.youtube.com/watch?v=X4vO...
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Verifiability is implemented via a proof which guarantees that the value that can be decrypted after time t is the one that was committed to.
In our example we could provide the public key and the proof guarantees that the encrypted private key corresponds to the public key.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
A Verifiable Timed Commitment (VTC) allows one to commit to a value that's encrypted "into the future".
For example, I can commit to and encrypt a private key in such a way that it can only be decrypted after time t.
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Paper: eprint.iacr.org/2020/1563.pdf
Repository: github.com/primefactor-...
Documentation: pkg.go.dev/github.com/p...
14.08.2025 07:50
👍 0
🔁 0
💬 1
📌 0
Excited to share my implementation of the paper "Verifiable Timed Signatures Made Practical" by Thyagarajan et al.
More specifically I implemented the Verifiable Timed Commitment scheme described in section E.
14.08.2025 07:50
👍 2
🔁 0
💬 1
📌 0
Verifiable Timed Signatures Made Practical
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for a given amount of time $T$ such that after performing a sequential computation for time $T$ anyone ...
Currently deep down the rabbit hole to finish my implementation of "Verifiable Timed Signatures Made Practical"
eprint.iacr.org/2020/1563
While doing so I had to update my LHTLP implementation.
It now features a range proof and new homomorphic operations: github.com/primefactor-...
12.08.2025 10:43
👍 0
🔁 0
💬 0
📌 0
How to 𝒫𝔩𝔬𝔫𝒦
Interactive 𝒫𝔩𝔬𝔫𝒦 Zero-Knowledge Proof Tutorial
ZKSecurity just dropped this truly awesome PlonK tutorial: plonk.zksecurity.xyz
06.08.2025 12:40
👍 2
🔁 1
💬 0
📌 0
Post-Quantum Readiness in EdDSA Chains
The impending threat posed by large-scale quantum computers necessitates a reevaluation of signature schemes deployed in blockchain protocols. In particular, blockchains relying on ECDSA, such as Bitc...
This is an interesting read on how EdDSA's hash-based key derivation (RFC 8032) can be used to compute PQ-ZKPs for private key ownership proofs: eprint.iacr.org/2025/1368
This is good news as it allows for an easier transition towards Post Quantum secure cryptocurrencies.
29.07.2025 06:29
👍 1
🔁 0
💬 0
📌 0
Cryptography and Security
That would be awesome!
For me first thing in the morning is checking the new publications on eprint.iacr.org (also followed arxiv.org/list/cs.CR/recent but there’s too much noise IMHO).
18.07.2025 06:09
👍 0
🔁 0
💬 1
📌 0
Diamond iO: Lattice-Based Obfuscation without Bootstrapping from Functional Encryption, toward...
YouTube video by Simons Institute
The recording of the Diamond iO talk by the Machina iO team that was held during the Simon Institute's "Obfuscation" workshop was just uploaded: www.youtube.com/watch?v=1RcK...
09.07.2025 14:07
👍 2
🔁 0
💬 0
📌 0
This is a great paper that explains how to obtain indistinguishability obfuscation (iO) via recursive Functional Encryption: piazza.com/class_profil...
It's basically a simplified version of the [BV15] paper: eprint.iacr.org/2015/163
04.07.2025 08:29
👍 1
🔁 0
💬 0
📌 0