Michele Orrù

270 posts

Michele Orrù banner
Michele Orrù

Michele Orrù

@mmaker

μ-almost everywhere Katılım Kasım 2009
1.4K Takip Edilen1.1K Takipçiler
Coach Louis
Coach Louis@OswaldPer4mance·
@NBTiller Hubermann will have you on his podcast talking about how Anal Injection of Creatine shows best results. You can then promote AG1 together
English
4
1
134
10K
Nick Tiller, Ph.D.
Nick Tiller, Ph.D.@NBTiller·
I take 100 grams of #creatine every day, straight up the ass. I can now move objects with my mind.
English
246
453
10.7K
733K
Michele Orrù retweetledi
vx-underground
vx-underground@vxunderground·
Former BlackHat board member Vincenzo Iozzo, and co-author of iOS Hacker's Handbook, had a relationship with Jeffrey Epstein. It appears Epstein attended DEFCON and/or BlackHat in 2013 and 2015, possibly 2016.
vx-underground tweet media
English
73
323
2.2K
290.8K
Michele Orrù
Michele Orrù@mmaker·
The zk agenda is moving! Just spoke at Linux Foundation's Decentralized Trust, great to see people realizing the lack of specifications in the space and working towards fixing this.
映彤 ✨🍄✨@therealyingtong

Introducing a new standards lab for generic zk-SNARKs, in collaboration with Linux Foundation Decentralized Trust (@lfdecentralized). Join us on 14 Jan for our first virtual meetup, along with Mary Maller, @srinathtv, @mmaker, and myself: meetup.com/lfdt-sf/events…

English
0
0
0
241
Michele Orrù
Michele Orrù@mmaker·
My talk at Collège de France is out! It’s been fun to give a lecture about modern tools for anonymity starting from simple zk tools, and bridge theory of cryptography with real-world authentication systems. youtu.be/5LlPTF8iivE?si…
YouTube video
YouTube
English
0
1
9
462
joseph.eth
joseph.eth@josephdelong·
@alpeh_v You should lean into it and ask them questions you know they can’t answer
English
2
1
4
611
Michele Orrù
Michele Orrù@mmaker·
the new dragon book cover is incredible
Michele Orrù tweet media
English
0
0
0
477
Michele Orrù
Michele Orrù@mmaker·
Presenting my paper on keyed-verification anonymous credentials at @acm_ccs in Taipei in just a few hours! 🗞️ eprint.iacr.org/2024/1552 Exciting to present it in the very same venue where I wrote a big chunk of it while attending @rightscon!
GIF
English
0
0
4
434
Michele Orrù
Michele Orrù@mmaker·
@alpeh_v @levs57 Sure but where can you find the recursive circuit? It doesn’t look like there’s any open source for custom AIRs atm
English
0
0
0
36
ʕ •ᴥ•ʔ
ʕ •ᴥ•ʔ@alpeh_v·
@mmaker @levs57 for the like 60k hashes range it makes sense to just recurse with less hashes and use groth for the super succinct proof.
English
1
0
0
73
ʕ •ᴥ•ʔ
ʕ •ᴥ•ʔ@alpeh_v·
whats the current state of the art on a simple client side small proofs (eg groth16 or plonk) with not very many constraints (eg o(200) Poseidon hashes)?
English
5
0
10
1.6K
Michele Orrù
Michele Orrù@mmaker·
@alpeh_v @levs57 p3 is zk and has no_std support (I was aabre to generate a wasm proof). agree that proof sizes are bad :( Curious to know if you end up finding something better, I'm on a similar boat as you
English
1
0
1
32
ʕ •ᴥ•ʔ
ʕ •ᴥ•ʔ@alpeh_v·
@mmaker @levs57 The problem is proof size because you need a (relatively) small one. But also secondarily I’m asking about which has the most mature engineering support for phones, browsers ect Plus afaik plonky3 isn’t zk which is needed for this application
English
1
0
0
63
ʕ •ᴥ•ʔ
ʕ •ᴥ•ʔ@alpeh_v·
@levs57 sigh and here I was hoping to avoid a rabbithole on this one
English
1
0
0
70
Michele Orrù
Michele Orrù@mmaker·
@nico_mnbl I'm sure only of: Damgård-KSND <=> WEE => KSND in [Gro04, Lin03] Damgård-KSND <=> Goldreich-KSND => KSND in [BG93] I'd be cool to prove equivalence (if it exists) with SR-KSND
Dansk
1
0
0
87
Michele Orrù
Michele Orrù@mmaker·
@nico_mnbl That's left as an excercise for the reader :( In any case you care about WEE => (rewinding) state restoration knowledge soudness for practical applications
English
1
0
0
76
Michele Orrù
Michele Orrù@mmaker·
@nico_mnbl Lindell is proving knowledge soundness from Dåmgard! It's tricky, I'm not sure how to prove the other direction.
English
1
0
0
67
Nico
Nico@nico_mnbl·
@mmaker Thought so too! The WEE => PoK implication is by definition. However in Lindell03, Lindell defines WEE and then shows that the direction PoK => WEE is also true! See lemma 3.1 of the paper eprint.iacr.org/2001/107
Nico tweet media
English
1
0
0
115
Michele Orrù
Michele Orrù@mmaker·
@UHaboeck @PG_CDG It’s correct, the model was such that the long term key is infrequently re-injected in the key exchange. There’s a longer story about the concrete guarantees, but it’s been formalized as post compromise security
English
0
0
1
46
ulrich.haboeck
ulrich.haboeck@UHaboeck·
@PG_CDG It can self heal when your private key was leaked? I hear this the first time. Are you sure that your are not confusing it with forward secrecy, meaning that once your key is known, it can be only used to decrypt current traffic, not the traffic prior to the leak.
English
1
0
0
55
Piergiorgio Catti De Gasperi
The world’s most used encryption was built by a man with a fake name. It protects 5 billion people. And he never monetized it. Here’s how a nonprofit is protecting the internet:
Piergiorgio Catti De Gasperi tweet media
English
27
104
703
25.4K