Nice to know the insights. Fully homomorphic encryption is a key challenge in cryptography that could change the world if made faster and more efficient. Mind Network is thrilled to be part of the evolvement!
I still in min 9, but just can't write the comment about Prof. Shafi "suits" example, didn't she herself mentioned Prof. Dan Boneh paper about "Reconciling ...."; ie, she said before it's a real case (not just an episode of a TV series) that developed to an ACM paper? I can get the link, it was in Berkeley too & introduced by Prof. Dawn Song too???
Wow Brilliant. Is PEReDi technically using significant ZK protocol and does it offer a solution that can be used by Governments to make the “Country Coin” backed by their national Resources? No more fiat? Also for DiD, sovereign IDs? I can see the local banks ( maybe a number of them ) being the Trusted Third Party? And offering insurance for transactions if desired.
Dan Boneh most inspiring person alive
Nice to know the insights. Fully homomorphic encryption is a key challenge in cryptography that could change the world if made faster and more efficient. Mind Network is thrilled to be part of the evolvement!
i totally love the hitch hikers guide and suits example LOL
I still in min 9, but just can't write the comment about Prof. Shafi "suits" example, didn't she herself mentioned Prof. Dan Boneh paper about "Reconciling ...."; ie, she said before it's a real case (not just an episode of a TV series) that developed to an ACM paper?
I can get the link, it was in Berkeley too & introduced by Prof. Dawn Song too???
Wow Brilliant. Is PEReDi technically using significant ZK protocol and does it offer a solution that can be used by Governments to make the “Country Coin” backed by their national Resources? No more fiat? Also for DiD, sovereign IDs?
I can see the local banks ( maybe a number of them ) being the
Trusted Third Party?
And offering insurance for transactions if desired.
Does it mean that when sending anything online (code) wherever math proof is not used there is a security vulnerability?
2 legends