This blog post is about benchmarking the IoT prototype we have been building for the FENTEC project, using functional encryption. For more information, please see

This blog post is about benchmarking the IoT prototype we have been building for the FENTEC project, using functional encryption. For more information, please see
In this post, we discover a strange creature named Modulo Bias, learn how it is born, why it is so dangerous, and how to fight
AMIS implemented a hierarchical variant of threshold signatures, using different levels/ranks in its distributed key generation (DKG) and signing logic, based on a previous research paper.
We have already discussed what Functional Encryption is in a previous post and mentioned we are building a prototype leveraging FE to detect motion. Let’s
On Tuesday the 14th of January 2020, in the frame of their first Patch Tuesday of 2020, Microsoft addressed a critical flaw discovered by the
Have you ever heard of Functional Encryption (FE)? If so, you may be associating it with some sort of homomorphic encryption, which is not wrong,