![martin mpc. iris profile martin mpc. iris profile](https://www.spiedigitallibrary.org/ContentImages/Proceedings/9909/990905/FigureImages/00006_psisdg9909_990905_page_10_1.jpg)
For instance, Bitcoin, the first application of blockchain, can currently handle up to 7 transactions per second, while mainstream payment solutions such as Visa can handle tens of thousands of transactions per second. Blockchain applications are, however, not yet ready for mainstream use due to scalability issues. Majid Khabbazian, Department of Electrical and Computer Engineering, University of AlbertaĪbstract: Blockchain is a distributed ledger technology, which has the potential to revolutionize markets and services as it enables mutually mistrusting entities cooperate in the absence of a trusted third party. In addition to designing and analyzing privacy-enhancing systems, Professor Henry is interested in practical matters like implementing and working toward the deployment of such systems, as well as more theoretical matters like devising number-theoretic attacks against non-standard cryptographic assumptions and developing new models and theories to understand just how efficient "heavy-weight" cryptographic primitives can be. His research explores the systems' challenges of applied cryptography, with an emphasis on using cryptography to build secure systems that preserve the privacy of their users. Short biography: Ryan Henry is an assistant professor in the Computer Science Department at the University of Calgary. Our new DPF-based technique provides a surprisingly efficient way to implement useful functionalities that were prohibitively costly to realize using prior approaches. Secure MPC is a cryptographic primitive that allows a set of mutually distrustful parties to evaluate joint functions on their private inputs without revealing those inputs to one another (nor to any third party).
MARTIN MPC. IRIS PROFILE HOW TO
Ryan Henry, Department of Computer Science, University of CalgaryĪbstract: This talk outlines some recent results demonstrating how to harness the power of so-called distributed point functions (DPFs) to implement efficient secure multiparty computations (MPC).