Post AvGNdpNGaLxnz6MPS4 by leon_p_smith@ioc.exchange
(DIR) More posts by leon_p_smith@ioc.exchange
(DIR) Post #AvGNdmlGIgNJseZ1w8 by jakelazaroff@mastodon.social
2025-06-17T13:44:48Z
0 likes, 0 repeats
📝 new blog post! i spent a while looking into homomorphically encrypted CRDTs. spoiler alert: they don’t work super well!(but you should still check it out — i break down what homomorphic encryption is and how it works, and there are lots of explorable explanations along the way!)https://jakelazaroff.com/words/homomorphically-encrypted-crdts/
(DIR) Post #AvGNdoBszBGYJW1o4e by jakelazaroff@mastodon.social
2025-06-17T13:45:51Z
0 likes, 0 repeats
this post languished in the drafts for like six months after i realized the result wasn’t what i was hoping for (those interactive circuit diagrams being an enormous pain to build didn’t help either 😮💨).thank you @pvh for encouraging me to publish it anyway!
(DIR) Post #AvGNdpNGaLxnz6MPS4 by leon_p_smith@ioc.exchange
2025-06-17T14:32:07Z
0 likes, 0 repeats
@jakelazaroffMy first question is, why do E2EE CRDTs require homomorphic encryption?I'm not intimately familiar with the precise details of CRDTs, but I don't see why this would be the case. I mean, a major application for them is building redundant clusters that need not have a single source of truth, and communicate via message passing.Why can't this problem be solved by simply having a e2ee messaging server to handle the connectivity and latency issues? Before you log off for the night, your laptop sends your E2EE update to the server, which is then available for your friend to download and process once they log in.This is interesting though, I don't know much about HE but it is the primary threat model of my work on self-documenting cryptography.
(DIR) Post #AvGNdq0yCjiryEw7Ky by lyyn@mastodon.ml
2025-06-18T18:32:44Z
0 likes, 0 repeats
@leon_p_smith @jakelazaroff Came here to ask the same question.
(DIR) Post #AvGYEOITDiVwGIBs1Y by leon_p_smith@ioc.exchange
2025-06-18T20:31:24Z
0 likes, 0 repeats
@lyyn @jakelazaroff Incidentally, if somebody wants to say, take the sample SHA256 implementation provided with TFHE-rs and benchmark how long it takes to compute one (or a few) SHA256 blocks inside homomorphic encryption, I would gladly cite your work in this design document:https://github.com/auth-global/self-documenting-cryptography/blob/prerelease/design-documents/g3pb2.md