Skip to content

Commit

Permalink
More intro edits
Browse files Browse the repository at this point in the history
  • Loading branch information
tideofwords committed May 4, 2024
1 parent d5ecce4 commit 90f5dc8
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions src/intro.typ
Original file line number Diff line number Diff line change
Expand Up @@ -139,6 +139,8 @@ What sort of systems can we build on top of programmable cryptography?
caption: [Expectations vs. reality.]
)

#todo[Aard suggests deleting the figure, it's cute but Aard isn't sure about the message]

When we think about how to use programmable cryptography we need to be creative.
As an example, what can you do with a zkSNARK?

Expand All @@ -149,11 +151,11 @@ Slightly better answer: You can prove that you have executed a program correctly
revealing some or all of the inputs and outputs, as you please.
For example: You know a messame $M$ such that
$op("sha")(M) = "0xa91af3ac..."$, but you don't want to reveal $M$.
Or: You only want to reveal the first 30 bytes of $M$ ("From: trusted@mailprovider.com").
Or: You only want to reveal the first 30 bytes of $M$.
Or: You know a message $M$, and a digital signature proving that $M$ was signed by
[trusted authority], such that a certain neural network, run on the input $M$, outputs "Good."

One recent application along these lines is
#link("tlsnotary.org")[TLSNotary].
#link("https://tlsnotary.org", "TLSNotary").
TLSNotary lets you certify a transcript of communications with a server
in a privacy-preserving way: you only reveal the parts you want to.

0 comments on commit 90f5dc8

Please sign in to comment.