Telegram Group & Telegram Channel
LibreCryptography
Indistinguishability Obfuscation This is a difficult concept to wrap one's head around, so maybe ask a real cryptographer at cryptography.stakcexchange.com , because they would be able to give you a more granular breakdown of it than this channel will. …
Here's the best way that this can be broken down:

1. This is sort of like homomorphic encryption (where an entity is able to maneuver and operate on top of encrypted data without decrypting the data or having knowledge of the underlying data being managed). The reason this comparison to homomorphic encryption is being drawn is because this is essentially a property that this cryptographic scheme must possess.

2. The goal of this cryptographic scheme is to allow for programs / packages to execute given commands & schemes without the instructions for said program being decipherable (i.e., the distinguishable part).

3. This would involve you feeding the program in question some sort of encrypted information that it could iterate upon to produce the desired result w/o ever needing to decrypt your input or the 'instructions' given to the machine

If this sounds like its impossible to you, then you're not the only that's held this belief. There are plenty of others that have been incredulous about the efficacy of this proposed cryptographic scheme for years (there are no working models yet, this is all purely theoretical)



tg-me.com/librecryptography/201
Create:
Last Update:

Here's the best way that this can be broken down:

1. This is sort of like homomorphic encryption (where an entity is able to maneuver and operate on top of encrypted data without decrypting the data or having knowledge of the underlying data being managed). The reason this comparison to homomorphic encryption is being drawn is because this is essentially a property that this cryptographic scheme must possess.

2. The goal of this cryptographic scheme is to allow for programs / packages to execute given commands & schemes without the instructions for said program being decipherable (i.e., the distinguishable part).

3. This would involve you feeding the program in question some sort of encrypted information that it could iterate upon to produce the desired result w/o ever needing to decrypt your input or the 'instructions' given to the machine

If this sounds like its impossible to you, then you're not the only that's held this belief. There are plenty of others that have been incredulous about the efficacy of this proposed cryptographic scheme for years (there are no working models yet, this is all purely theoretical)

BY LibreCryptography


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283

Share with your friend now:
tg-me.com/librecryptography/201

View MORE
Open in Telegram


LibreCryptography Telegram | DID YOU KNOW?

Date: |

The seemingly negative pandemic effects and resource/product shortages are encouraging and allowing organizations to innovate and change.The news of cash-rich organizations getting ready for the post-Covid growth economy is a sign of more than capital spending plans. Cash provides a cushion for risk-taking and a tool for growth.

Dump Scam in Leaked Telegram Chat

A leaked Telegram discussion by 50 so-called crypto influencers has exposed the extraordinary steps they take in order to profit on the back off unsuspecting defi investors. According to a leaked screenshot of the chat, an elaborate plan to defraud defi investors using the worthless “$Few” tokens had been hatched. $Few tokens would be airdropped to some of the influencers who in turn promoted these to unsuspecting followers on Twitter.

LibreCryptography from id


Telegram LibreCryptography
FROM USA