Hacker News new | past | comments | ask | show | jobs | submit login

You can do some really cool cryptography if you assume your adversary has limited space. Examples include non-transferable signatures and streaming programs that stop functioning when the stream stops (repugnant as a DRM but neat as a concept)

https://eprint.iacr.org/2021/406




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: