The founders of WazirX share his predictions for the next big wave of cryptography – Texasnewstoday.com

As the founder of Indias largest crypto exchange, Nischal Shetty is touching on a new trend.

In 2017, after more than a week to buy his first Bitcoin, he found a market gap and simplified the then fast-growing digital currency trading.

By 2018, he launched WazirX as a localized cryptocurrency trading platform in his native India. The business was later acquired by Binance, the worlds largest crypto exchange.

Currently, he is looking at the next stage of cryptocurrency growth.

Encryption is still early, so the challenge is to understand when the idea is right.

Nischal Shetty

Founder and CEO of WazirX

The last three to four years have been the time to build crypto exchanges and layer one blockchain product, Shetty told CNBC MakeIt.

A blockchain is a decentralized digital ledger that can be used to record data and transactions. One of its main uses is the storage and management of digital currencies such as Bitcoin and Ethereum. This is a form of virtual cash that operates independently of the state government.

Choosing the right idea at the right time will be the key to building the next big crypto company, he added.

Co-founder of Sameer Mhatre, Nischal Shetty, Siddharth Menon and WazirX, the Indian crypto exchange.

WazirX

Its not easy to pinpoint that trend, but software developer Shetty, 36, hopes for the next wave of consumer products that will make digital currencies more accessible in everyday life. Said.

Deutsche Bank estimates that today there are about 50 million blockchain wallet users worldwide. By 2030, banks expect that number to reach 200 million as digital currencies become more widely used.

I think the next few years will be building crypto products for consumers. So far, its not really in the hands of people, Shetty said. Then cryptography will emerge as another major area for people to explore.

The key to becoming an entrepreneur is to get the timing right, Shetty said, saying that the mainstream adoption of cryptocurrencies and blockchain technology is now a bit far away.

Cryptocurrencies are still early, so the challenge is to understand the right time for ideas, says Shetty. Given the current technical state of cryptography, a significant number of these ideas cannot be realized.

The crypto industry is facing increasing international pressure as authorities consider concerns that it may support tax evasion and criminal activity.

As part of that, WazirX has been caught in the midst of ongoing cryptocurrency debates among Indian authorities, and Shetty has worked with other exchanges to work with the countrys top financial decision makers. We are jointly involved.

This is an opportunity for entrepreneurs and anyone with an idea to participate and build it.

Nischal Shetty

Founder and CEO of WazirX

It wont be a smooth ride because of mistakes, which will come with a lot of difficulties from a regulatory point of view, he said.

Shetty likened this situation to the early days of the Internet. Initially, it was difficult to send e-mail due to poor technology and slow internet speeds. Video calling is now commonplace and an important part of society.

Still, regulators are trying to keep up with the rapidly evolving technology industry.

Similarly, the new blockchain technology offers developers and entrepreneurs the opportunity to play a role in building the next wave of innovation, Shetty said.

It will take some time, but its time for an entrepreneur or anyone with an idea to get involved and build it, he said.

Do not miss it: How this 36-year-old coder built Indias largest crypto exchange

Do you like this story Subscribe to CNBC Make It on YouTube!

The founders of WazirX share his predictions for the next big wave of cryptography

Source link The founders of WazirX share his predictions for the next big wave of cryptography

Link:
The founders of WazirX share his predictions for the next big wave of cryptography - Texasnewstoday.com

Clubhouse’s Indian alternative, the Leher app, has witnessed a surge in crypto-related debates-Technology News, Firstpost – Ohionewstime.com

FP trendJuly 15, 2021 14:53:54 IST

Bangalore-based social networking platform amid the growing trend of crypto in India Leher We have witnessed a constant surge in cryptocurrency-related debates. Discussions on the platform usually revolve around how to invest in cryptography, blockchain technology, Indian cryptography regulations, their scope, and the outlook for crypto investment.

Every day, India has a user base of 10 million crypto users.

In March last year, the Supreme Court lifted the RBI Banks ban on crypto trading focused on alternative regulatory measures. Since then, the cryptocurrency debate has grown many times domestically. Recently, India was ranked 11th on the list of global cryptography adoption by the Chainalysis Report. Every day, the country has a user base of 10 million crypto users.

Vikas Malpani, co-founder and CEO of Leher, commented on the ongoing Crypto discussions on the app:These discussions about Leher The app helps people seek better understanding with professionals.

Known as an Indian alternative to the Newyork-based audio platform club house, Leher We provide services to people with similar interests and preferences to connect, learn, discuss ideas, and build fruitful relationships. The user base of this app is currently 2.30 Rak, doubling every month. Users typically spend about 15 minutes to 2 hours on apps. It is available for both Android and iOS and has a rating of 4.3 out of 5. Google Play Store..

Users can use the app by signing up with a Facebook account, Gmail account, or phone number. After signing up, the app redirects the user to the screen of interest and selects from there. Like other social media platforms, users can also follow each other and send direct messages.

Unlike club house, Leher Anyone can use it, but private clubs require an invitation. Vikas also revealed that the app is also working on multiple monetization models to allow content creators and curators to monetize their viewers and collaborate with their brands.

; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window,document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '259288058299626'); fbq('track', 'PageView');

Clubhouses Indian alternative, the Leher app, has witnessed a surge in crypto-related debates-Technology News, Firstpost

Source link Clubhouses Indian alternative, the Leher app, has witnessed a surge in crypto-related debates-Technology News, Firstpost

Original post:
Clubhouse's Indian alternative, the Leher app, has witnessed a surge in crypto-related debates-Technology News, Firstpost - Ohionewstime.com

Fifth Third Bank Deploys Unbound CORE to Secure Sensitive Data in the Cloud – PRNewswire

When the bank began upgrading and modernizing its data infrastructure including an organization-wide move to the cloud it turned to tokenization as a means of securing that data. It needed to ensure end-to-end security of its most sensitive information and that data could be segregated on multiple levels to limit the impact of a compromise or technical issue.

While refreshing its infrastructure and moving legacy apps to AWS Cloud and creating new ones for mobile, the bank also required a solution that provided secure tokenization with a fast application integration API and that had a minimal impact on its existing databases.

The bank deployed Unbound CORE over AWS and two data centers, supporting the tokenization of assets across multiple applications. The platformuses multiparty computation, an advanced form of cryptography, to split encryption keys into shares and never bring them together to eliminate the single point of failure in cryptographic deployments. Critically, other functions built on top of this technology such as the ability to tokenize complex data and make it functional with any existing database ease the cloud migration process for developers.

Philip Schneider, director of security engineering at Fifth Third Bank, comments: "Securing sensitive data is absolutely critical for cloud adoption, specifically in the financial sector. When we embarked on our cloud migration, we knew it had to be one of our top priorities. The local container tokenization product that Unbound is creating has huge potential to safely post services forward into untrusted zones, in trusted ways."

Fifth Third Bank secures between 30 to 50 distinct applications with CORE and is examining other ways of utilizing the technology to streamline and simplify its tech stack and to continue to bring premium services and unprecedented security to its customers.

Prof. Yehuda Lindell, chief executive officer at Unbound Security, comments: "At Unbound, we want to ensure that both financial institutions and enterprises can deploy security across their business without compromising on operations or the user experience. Multiparty computation and our CORE platform have helped dozens of enterprise clients do just that, and we are honored to have Fifth Third as one of our primary customers."

For more information on Fifth Third Bank's use of Unbound CORE, please read the case study here.

About Unbound Unbound Security is the global leader in cryptography and empowers enterprise customers worldwide to confidently secure, manage and authenticate all critical business transactions, information, identity and digital assets anywhere, anytime. Unbound Security CORE is the enterprise platform of choice for secure key management, trusted by many of the world's largest banks and Fortune 500 companies. Unbound Security is a recent recipient of the Deloitte Fast 500 award and is headquartered in New York, with research and development facilities in Tel Aviv. For more information visit http://www.unboundsecurity.com.

About Fifth Third Fifth Third Bancorp is a diversified financial services company headquartered in Cincinnati, Ohio, and the indirect parent company of Fifth Third Bank, National Association, a federally chartered institution. As of March 31, 2021, Fifth Third had $207 billion in assets and operated 1,098 full-service banking centers and 2,383 ATMs with Fifth Third branding in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia, Georgia, North Carolina and South Carolina. In total, Fifth Third provides its customers with access to approximately 53,000 fee-free ATMs across the United States. Fifth Third operates four main businesses: Commercial Banking, Branch Banking, Consumer Lending and Wealth & Asset Management. Fifth Third is among the largest money managers in the Midwest and, as of March 31, 2021, had $464 billion in assets under care, of which it managed $58 billion for individuals, corporations and not-for-profit organizations through its Trust and Registered Investment Advisory businesses. Investor information and press releases can be viewed at http://www.53.com. Fifth Third's common stock is traded on the Nasdaq Global Select Market under the symbol "FITB." Fifth Third Bank was established in 1858. Deposit and Credit products are offered by Fifth Third Bank, National Association. Member FDIC.

Media Contact: Marcella P. Arthur [emailprotected]Tel. +1 (908) 601-2333

SOURCE Unbound Security

Read more:
Fifth Third Bank Deploys Unbound CORE to Secure Sensitive Data in the Cloud - PRNewswire

History will look at current reforms as strong as those of 1991, says CEA – The New Indian Express

Express News Service

NEW DELHI: The government has taken enough measures in the past one year to ensure that when the pandemic is over, the countrys economy grows by over 7%, the chief economic advisor to the government Krishnamurthy Subramanian said in an interaction withThe New Indian Express. For FY23, we expect the growth to be close to 7%, and from thereon, it will accelerate further as the impacts of the reforms are seen on the ground, says the CEA.

He says that India was the only country, which launched a slew of reforms during the pandemic, and that too, big-ticket reforms. The reforms that he enlisted include the privatisation and asset monetisation push of the government, capex- driven growth, opening up of sectors like defence, cryptography, mining, PLI scheme, labour and farm reforms.

When you put all these reforms together, and the 135% increase in healthcare spending and 35% increase in capex, the overall investment in the economy will go up significantly because of the crowding in effect and so will the productivity, he says. Subramanian feels when history looks at this period, these reforms would be considered as strong as the 1991 reforms.

On the immediate impact of the second wave on the economy, the CEA says that the impact of the second wave is much lower than the first wave and hence he believes that the GDP growth in the current financial year would not be significantly lower than the Budget estimate. The government has in the Budget estimated 10.5% GDP growth, which Subramanian feels was on the conservative side, unlike IMF which had estimated 12.5%.

He termed the current financial year as a very important year for privatisation as the government is pushing through privatisation of entities like BPCL, Concor, and public listing of insurance behemoth LIC during the year. On privatisation of Air India, he said though the money that would come from Air India may not be large, it is important from a signaling perspective as it would show the governments intent of getting out of business that it had no business being in the first place.

When asked if inflation would play a spoiler in Indias recovery, the CEA said that the over 6% inflation in the past two months were primarily because of supply-side constraints due to restrictions on economic activities. However, he feels that since the economic impact of the second wave was much lower, the inflation would start moderating soon.

Justifying the high fuel taxes, the CEA said that while evaluating the cause of high fuel prices one must also keep in mind the fact that India is not the only country where taxes account for 60% or more of the total fuel price. He said countries like the UK, Germany, Brazil, etc also have similar kind of taxes, and that taxes in India are in no way higher than those in other countries. He also blamed the rise in crude oil prices from less than $30 to $75 for the high oil prices.

Visit link:
History will look at current reforms as strong as those of 1991, says CEA - The New Indian Express

Artificial Intelligence the hottest skill to have in post-pandemic world: Survey – Mint

Mumbai: Five skills, including artificial intelligence and adaptability, can future-proof workforce in a post-pandemic world, according to a global study by Randstad RiseSmart.

Of these skills, which also include creativity, blockchain, and affiliate marketing, artificial intelligence has emerged as one of the hottest skills to have, according to the study which surveyed HR professionals and employees across several regions including India.

"AI's demand is only set to increase as technology adoption continues. Being a highly scientific field, employees seeking to upskill in this area have taken on a pragmatic approach that translates knowledge into real-world skills and helps them develop capabilities to create data sets, build machine learning models, and use Python and/or R programming to deliver measurable results," said Randstad RiseSmart in a statement.

According to the World Economic Forum, 50% of employees worldwide will need reskilling as technology adoption increases, and this need has likely only increased given the pandemic.

The survey findings add adaptability and creativity as the next best skill to have. Having the right know-how and being able to adapt to changing trends, destabilization, industry shifts can make all the difference to how business functions today, and hence will see strong demand from employers. "When the pandemic set in, businesses had to transform their operating models practically overnight. Being able to adapt to changing situations with ease, and in an efficient manner is a sign of a strong leader," Randstad RiseSmart revealed.

Among a global pool of 1,099 HR professionals and 1,142 employees, across eight countries and 20 industries, the survey took into consideration 152 HR professionals and 154 individual employees from India, representing businesses of all sizes.

Also, blockchain, which was initially designed to be a technology to support, Bitcoin has now evolved into a revolutionary means of handling data and doing business in a digital world. As the demand for blockchain technologies in daily operations increases, so has the demand for resources with a strong knowledge of the same. "Within this space, employers have laid emphasis on identifying and recruiting talent with a strong knowledge of understanding cryptography, distributed computing, security, and consensus algorithms," the survey added.

With large-scale unrest and uncertainty in the market, trust between consumers and brands is at an all-time low. In order to remedy this, affiliate marketing is emerging as an important skill today. Being an affiliate marketer involves constantly ideating to solve problems and bring in solutions that will restore customers faith in brands. From research and analytics to planning and executing well-crafted campaigns that deliver measurable results, affiliate marketing has a lot of potentials to change the face of the sales game.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our App Now!!

See the original post here:
Artificial Intelligence the hottest skill to have in post-pandemic world: Survey - Mint

Meet the Company That Wants to Bridge Crypto With Diem – bitcoinist.com

When Facebook announced its Diem blockchain project, many people got excited. But unfortunately, it is a system that remains a closed loop, which is unfortunate despite the ecosystems potential. The team behind Pontem Network aims to change this narrative by creating a permission-less version of Diem.

The vision of Pontem Network is relatively straightforward: build a permission-less version of Diem. The blockchain will be interoperable with Facebooks venture yet open the doors for global entrepreneurs to try new ideas and features. The Pontem network venture has backing from multiple renowned funds and entities, confirming demand for a more open version of Diem.

Rather than compete with the Facebook ecosystem, Pontem is complementary. It connects to Diem and the decentralized world, providing access to cryptocurrency markets and their segments. For users of Facebook-backed blockchain, this will allow access to DeFi, NFTs, games, and other instruments. All of this is possible thanks to Facebooks Move technology, allowing crypto developers to build applications for it.

Under the hood, the Pontem team brings MovE to the Polkadot ecosystems. Connecting their permission-less version of Diem to cross-chain compatible ecosystems is an essential first step. Then, developers can test their ideas in a Move-compatible ecosystem before releasing them to the Diem blockchain. Pontem aims to become the developers platform of choice. The first use case is Pontem Blocks, a universal interface to create products and services.

The Pontem Network project has successfully raised $4.5 million in funding to date. That is a lot of money, which warrants a closer look at the team. Stas Oskin and Boris Povod are the co-creators of Pontem network. However, both individuals have worked on other prominent crypto projects, including Lisk, Ark, WINGS.DAO, and Beam MimbleWimble. Moreover, they have years of experience with the Cosmos and Diem ecosystems.

Boris Povod is best-known for developing the first Delegated Proof-of-Stake Dapp blockchain under the Crypto banner in 2014. That infrastructure eventually gave rise to Lisk and Ark in the following years. Boris also developed the WINGS DAO in 2016, allowing him to gather ample expertise on all blockchain and cryptography matters.

Back in 2013, Stas Oskin was working with Spondoolies to launch their B2C cryptocurrency mining operation. He later joined the core Crypto team and helped establish the WINGS DAO with Povod. Additionally, Oskin was a contributor to launching Beam MimbleWimble in 2018.

By joining forces on Pontem Network, Povod and Oskin bring more flexibility to Facebooks Diem. It is crucial to have a development sandbox to try ideas before porting them over. Tools provided by Pontem Network include a complete toolset, for VASPS (Virtual Asset Service Providers), to build Dapps and a package manager. Such an approach can attract hundreds of millions of users who want to create new products and services. One can see Pontem Network as a Diem canary in the coal mine network with no restrictions or limitations.

Read more:
Meet the Company That Wants to Bridge Crypto With Diem - bitcoinist.com

What Is Proof of Stake and How Does It Differ from Proof of Work? – Analytics Insight

Introduction

The principle of blockchain technology is to create a public ledger with no regulatory authority. Some questions arise. Who verifies the financial transactions? How can the blockchain be sure that you are not trying the same funds thrice?

The nodes in the blockchain are responsible for transaction verification. How do they do it? This is the point that Proof of Stake (PoS) and Proof of Work (PoW) come into the picture.

Proof of stake and proof of work serves as a consensus mechanism to verify transactions. There are several other consensus mechanisms. PoW and PoS are the most common methods by far. These two methods eliminate the need for third-party verification.

Moni Naor and Cynthia Dwork published the results of their research on the Proof of Work consensus mechanism in 1993. When Bitcoin came on the scene, Satoshi Nakamoto used the proof of work system to verify transactions.

The proof of work protocol prevents duplicate and fraudulent transactions. Some other cryptocurrency blockchains also follow Bitcoins proof of work system. Each participant in the PoW consensus mechanism is called a miner. There are thousands of miners on the network.

The basis of the proof of work is an advanced level of mathematics called cryptography. Only computers can solve the complex mathematical equations needed to confirm a transaction. Each miner has to work hard and compete to solve the cryptographic equation.

The miner who solves the problem first gets the entire reward. One issue with the Proof of Work is that it is not based on a just system. People who have more powerful hardware resources have a higher probability of getting rewarded with new coins. The other miners in the network will receive zero rewards. Computations that use this protocol also consume a large amount of electricity.

Visit Bitcoin Prime to keep yourself updated with the latest news in the blockchain and cryptocurrency domain.

Sunny King and Scott Nadal created the proof of stake model in 2012. The first cryptocurrency project to use this algorithm was Peercoin. The Proof of Stake aims to make the validation process virtual. The flow process for the Proof of Stake consensus mechanism is the same as that of PoW.

However, the method to achieve the end result is distinct. Proof of Stake replaces the miners with validators or forgers. These validators will house their resources in the blockchain as a stake. They will wager on the next block that they feel should be included in the chain.

Each contributor or validator will receive a reward according to their stake. Ethereum developers are planning to migrate from the Proof of Work (PoW) method to Proof of Stake (PoS). PoS will consume fewer electricity resources during mining compared to PoW.

Proof of Stake can also make attacks on the blockchain more difficult. It will cost too many resources to make an attack on the chain. One downside of the PoS consensus mechanism is the large number of coins required before a forger is allowed to make a stake.

Blockchain technology is designed to be secure and immune to cyber-attacks. It is the most difficult task to hack a blockchain. However, this is not to say it is entirely impossible. Some of the common techniques hackers use are the 51% attack and Distributed Denial of Service (DDoS). DDoS tries to send multiple requests to shut down the blockchain server.

For these reasons, a secure protocol is needed to continuously keep the network from malicious attacks. There is a lot of ongoing research to develop better methods to protect the blockchain.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Analytics Insight is an influential platform dedicated to insights, trends, and opinions from the world of data-driven technologies. It monitors developments, recognition, and achievements made by Artificial Intelligence, Big Data and Analytics companies across the globe.

See the original post here:
What Is Proof of Stake and How Does It Differ from Proof of Work? - Analytics Insight

Quantum Cryptography Market TO GARNER Scalable Heights Of Growth By 2026 ZMR Study The Courier – The Courier

TheQuantum Cryptography Market TO GARNER Scalable Heights Of Growth By 2026 ZMR Studyreport covers all of the aspects required to gain a complete understanding of the pre-market conditions, current conditions as well as a well-measured forecast.This report also researches and evaluates the impact of Covid-19 outbreak on theQuantum Cryptography Market, involving potential opportunity and challenges, drivers and risks.

A comprehensive evaluation of theQuantum Cryptography Markethas been presented in the report for the forecasted period 2020 to 2025. In order to get a deep insight into the market, a wide range of segments have been covered in the report along with the thorough analysis of the key trends and the factors that impact the market. The main highlight of the report includes the key factors that impact theQuantum Cryptography Market, the market dynamics, major drivers, restraining factors, and the opportunities and threats that arise in the market. The intrinsic factors that have been identified are restraints and drivers. The identified threats and opportunities are the extrinsic factors that exist in the market setting. The thorough study provides an insight into the market development in terms of the revenue generation capacity during the forecasted period.

This Research Help Grow Your Business [Download free Sample PDF of Research Report]

Quantum Cryptography Marketresearch methodologies comprise primary research, secondary and expert panel reviews. Secondary research consists of the following sources: company annual report, research papers, and press releases, as documented in the industry. For further understanding, the following have been considered: Industry magazines, trade journals, government websites, and associations since they also contain vital information that can be useful during the study period. If all these sources are efficiently used to gather information about the industry, then theQuantum Cryptography Marketachieves its goals in the study, which is most likely to expand its territory in the market.

The Leading Market Players Covered in this Report are:

PQ Solutions (U.K), Infineon (Germany), Qubitekk (U.S), Quintessence labs (Australia), Nucrypt Llc (U.S), Crypta Labs (U.K), Qutools GmbH (Germany), Magiq Technologies (U.S), NEC Corporation (Japan), Toshiba (Japan).

Get Sample PDF Brochure@https://www.zionmarketresearch.com/sample/quantum-cryptography-market

Primary research has been the best way during the study, as it involves things like; telephone conversations that can be either as interviews or creation of appointments between theQuantum Cryptography Marketresearchers and market players. Questionnaires are also used, and this can also be sent as emails or distributing them to the people for question and answer moments. Lastly, there is a face-to-face interaction between the researchers and the market players. This has been the most effective way the two parties involved engage in one on one question and answer sessions. At primary research, the engagement always leaves bothQuantum Cryptography Marketresearch and the market players convinced of the way forward for the betterment of the industry. Primary research enhances discussion on essential factors such as market trends, size, competitions involved has to be done on an ongoing basis with industry experts, to understand the existing market.Scope of the Report

This report consists of all the requirements for the analysis of theQuantum Cryptography Marketstudy. Moreover, it provides a comprehensive market estimate from secondary research, primary interviews, and in-house expert reviews. These market estimates have been used to impact social, economic, and political factors, along with the trending market dynamics that hinder the growth of Valve Driver Market.

Aside from the market overviews, there have been market dynamics that consist of ;/Porters Five Force analysis, which explains the five forces. The forces are buyers bargaining power, suppliers bargaining power, intimidations by the new entrants, threats by the new substitutes as well as the levels of competition in theQuantum Cryptography Market.

Inquire More about Report:https://www.zionmarketresearch.com/inquiry/quantum-cryptography-market

This report also explains various participants, including software and platform vendors, system integrators, end-users, and the mediators between theQuantum Cryptography Marketresearcher and the market players in the system of the market. The report also concentrates on the background aggressiveness ofQuantum Cryptography Market.

Quantum Cryptography Market: Competitive Landscape

The market analysis entails a section solely dedicated to significant players in theQuantum Cryptography Market. For every major players financial statement, our team of analysts offers insight, vital developments, SWOT analysis as well as product benchmarking. Financial information and business overview are also included in the company profile section. With regards to what the client needs, the companies provided are customizable.

Our report which includes the detailed description of mergers and acquisitions will help you to get a complete idea of the market competition and also give you extensive knowledge on how to excel ahead and grow in the market.

The classification of the globalQuantum Cryptography Marketis done based on the product type, segments, and end-users. The report provides an analysis of each segment together with the prediction of their development in the upcoming period. Additionally, the latest research report studies various segments of the globalQuantum Cryptography Marketin the anticipated period.

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

Note In order to provide more accurate market forecast, all our reports will be updated before delivery by considering the impact of COVID-19.

(*If you have any special requirements, please let us know and we will offer you the report as you want.)

View post:
Quantum Cryptography Market TO GARNER Scalable Heights Of Growth By 2026 ZMR Study The Courier - The Courier

Google open-sources tools to bring fully homomorphic encryption into the mainstream – The Daily Swig

John Leyden16 June 2021 at 13:46 UTC Updated: 16 June 2021 at 15:10 UTC

Cryptographic expertise not needed to enable computations on encrypted data, says tech giant

Google has released a set of coding utilities that allowfully homomorphic encryption (FHE) operations on encrypted data.

The open source collection of libraries and tools allow computational processes to be carried out on encrypted data without first having to decrypt it, offering security and privacy benefits as a result.

Homomorphic encryption and secure multi-party computation are known technologies. Googles release is largely focused on refining and making them suitable for wider deployment, rather than reinventing the basis for the technologies.

Catch up on the latest encryption-related security news and analysis

Our release focuses most on ease of use, cleanly abstracting the various layers of development between design (what the developer is actually trying to do) and implementation (what actually is performed), a Google spokesperson told The Daily Swig.

The transpiler offers a glimpse into all of these layers, allowing the combined expertise of the crypto, hardware, logical optimization and distributed computing communities to come together in one place.

The suite of tools is available on Github.

Use cases for homomorphic encryption range from spell checkers for an email, to updates from wearables, to medical record analysis to, further down the road, things like photo filters or genomic analysis, according to Google.

The more sensitive or identifying the use case might be, the more important it is that a developer is able to provide strong guarantees on data handling, the Google spokesperson added.

No special expertise in cryptography is required to make use of the search giants technology, which is geared towards overcoming a lack of crypto expertise amongst developers that has historically held back wider adoption of such tools.

DONT FORGET TO READComputer Fraud and Abuse Act: What the landmark Van Buren ruling means for security researchers

The trade-off for the privacy benefits of homomorphic encryption is that the mechanism can be more computationally intensive and slower than other methods an issue not immediately addressed in Googles release.

Performance remains a significant barrier (one we continue to work on) and so this wont be a drop-in replacement for all existing cloud services, the Google representative explained.

At the moment, this environment is aimed at well-scoped problems where data sensitivity is critical or where extra compute cost is worth the added privacy benefit.

Google's approach to fully homomorphic encryption in explained in more detail in a recent white paper (PDF).

Professor Alan Woodward, a computer scientist from the University of Surrey, said Googles FHE tools might be useful across a wide range of applications.

What Google appear to be doing is providing tools to enable FHE across a wide range of areas, he explained.

Bottom line is that anything where you want the dataset encrypted when in live use, not just encrypted at rest, then FHE could help.

RELATED GitHub changes policy to welcome security researchers

More:
Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig

Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 KSU | The Sentinel Newspaper – KSU | The Sentinel…

The business report released by Zion Market Research on Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 is focused to facilitate a deep understanding of the market definition, potential, and scope. The report is curate after deep research and analysis by experts. It consists of an organized and methodical explanation of current market trends to assist the users to entail in-depth market analysis. The report encompasses a comprehensive assessment of different strategies like mergers & acquisitions, product developments, and research & developments adopted by prominent market leaders to stay at the forefront in the global market.

FREE | Request Sample is Available @ https://www.zionmarketresearch.com/sample/quantum-cryptography-market

The major players in the global Quantum Cryptography Market are PQ Solutions (U.K), Infineon (Germany), Qubitekk (U.S), Quintessence labs (Australia), Nucrypt Llc (U.S), Crypta Labs (U.K), Qutools GmbH (Germany), Magiq Technologies (U.S), NEC Corporation (Japan), Toshiba (Japan).

Along with contributing significant value to the users, the report by Zion Market Research has focused on Porters Five Forces analysis to put forward the wide scope of the market in terms of opportunities, threats, and challenges. The information extracted through different business models like SWOT and PESTEL is represented in the form of pie charts, diagrams, and other pictorial representations for a better and faster understanding of facts.

The growth and restraining factor section covers all the pain points and the touch points of the Quantum Cryptography Market. The insights are the conclusions from high authorities resources. Ourexperts and analysts use various market projection methodologies and quantitative customer insight tools to arrive at reliable conclusions. The report used uses various statistical tools toeradicate the errors in findings and estimate accurate long-term forecasts. Also, the trend projection method used in a the report presents the sales and demand from recent years and the future growth opportunities and trends.The report can be divided into following main parts.

Growth drivers:

The report provides an accurate and professional study of global Quantum Cryptography Market business scenarios. The complex analysis of opportunities, growth drivers, and the future forecast is presented in simple and easily understandable formats. The report comprehends the Quantum Cryptography Market by elaborating the technology dynamics, financial position, growth strategy, product portfolio during the forecast period.

Download Free PDF Report Brochure @ https://www.zionmarketresearch.com/requestbrochure/quantum-cryptography-market

Segmentation:

The report is curate on the basis of segmentation and sub-segmentation that are aggregated from primary and secondary research. Segmentation and sub-segmentation is a consolidation of industry segment, type segment, channel segment, and many more. Further, the report is expanded to provide you thorough insights on each segment.

Regional analysis:

The report covers all the regions in the world showing regional developmental status, the market volume, size, and value. It facilitates users valuable regional insights that will provide a complete competitive landscape of the regional market. Further, different regional markets along with their size and value are illustrated thoroughly in the report for precise insights.

Inquire more about this report @ https://www.zionmarketresearch.com/inquiry/quantum-cryptography-market

Competitive analysis:

The report is curate after a SWOT analysis of major market leaders. It contains detailed and strategic inputs from global leaders to help users understand the strength and weaknesses of the key leaders. Expert analysts in the field are following players who are profiled as prominent leaders in the Quantum Cryptography Market. The report also contains the competitive strategy adopted by these market leaders to the market value. Their research and development process was explained well enough by experts in the global Quantum Cryptography Market to help users understand their working process

Key Details of the Existing Report Study:

Frequently Asked Questions

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Us:

Zion Market Research is an obligated company. We create futuristic, cutting-edge, informative reports ranging from industry reports, the company reports to country reports. We provide our clients not only with market statistics unveiled by avowed private publishers and public organizations but also with vogue and newest industry reports along with pre-eminent and niche company profiles. Our database of market research reports comprises a wide variety of reports from cardinal industries. Our database is been updated constantly in order to fulfill our clients with prompt and direct online access to our database. Keeping in mind the clients needs, we have included expert insights on global industries, products, and market trends in this database. Last but not the least, we make it our duty to ensure the success of clients connected to usafter allif you do well, a little of the light shines on us.

Contact Us:

Zion Market Research244 Fifth Avenue, Suite N202New York, 10001, United StatesTel: +49-322 210 92714USA/Canada Toll-Free No.1-855-465-4651Email: sales@zionmarketresearch.comWebsite: https://www.zionmarketresearch.com

Go here to see the original:
Quantum Cryptography Market share forecast to witness considerable growth from 2020 to 2026 KSU | The Sentinel Newspaper - KSU | The Sentinel...