QuantumShield

QuantumShield

Telecommunications

Orinda , California 224 followers

Classic lattice based cryptography without the size problem.

About us

We do dense lattice cryptography.

Industry
Telecommunications
Company size
2-10 employees
Headquarters
Orinda , California
Type
Privately Held
Founded
2021
Specialties
CyberSecurity, Post Quantum Cryptography, and lattice

Locations

Employees at QuantumShield

Updates

  • View organization page for QuantumShield, graphic

    224 followers

    So I don’t need to keep repeating myself, for a scheme to achieve CCA and CCA2 security, it needs to be vulnerable to attacks that have access to a decryption oracle. Ciphertext only homomorphism doesn’t have one. IND-CPA is the appropriate security definition.

  • View organization page for QuantumShield, graphic

    224 followers

    Today's #cryptography topic is identity based encryption (IBE). IBE has one drawback compared to traditional asymmetric public key cryptography, the trust model is centralized which means: 1) You need to trust a central authority to generate your private keys and send them so you securely. 2) You need to trust that same central authority to not decrypt your private communications. 3) You need to trust that same central authority to not become compromised, as that would require a sophisticated backup/recovery mechanism to refresh all the keys securely in the event of a breach. If you can get over these problems IBE offers some significant advantages over traditional PKE. First some definitions: Identity(ID): Any identifier string, your name, email address, phone number, SSN, X.509 common name, or cybernetic AI model designator. This is the intended receiver of enciphered messages. Identity Public Key(IPK): This is the public key which is derived from your ID using a deterministic function(usually a specific hash), which anyone can perform. This turns your ID 'my.name@example.com' into a working public key. Private Key Generator(PKG): The central authority that takes generates your private key(s) based on your IPK. In this case, it would be the 'example.com' cryptographic domain. Identity Secret Key(ISK): This private key is created by the PKG based on your ID and is sent via secure channels to you. Master Public Key(MPK): This is the main public key for the entire system, created and published by the PKG. This is the only key you need to send to anyone with an email address that ends in 'example.com'. Shared Secret(SS): This is a secret seed that is used to key a stream cipher for efficient encryption/decryption of the actual payload, and the sender side and receiver side need to be able to arrive at the same value. Setup: 1) The PKG generates and publishes the MPK for the example.com domain. 2) The PKG generates and sends the ISK for 'your.name@example.com' to you. Sending: 1) The sender takes your ID string, derives your IPK. 2) Using the magic of cryptography, the sender combines the domain MPK, your IPK, an ephemeral key or nonce (for forward secrecy), and winds up with a shared secret and an ephemeral transmission key. 3) The sender keys AES or some other stream cipher using their shared secret and encodes the payload. 4) The sender sends the transmission key and associated enciphered payload to the recipient. Receiving: 1) The receiver takes the transmission key, and their ISK, and using the power of cryptography derives their shared secret, which will match the senders. 2) The receiver keys AES to decrypt the payload. Advantages: 1) No need to pre-share or download on demand individual public keys, as they can be derived by ID. You only need the single MPK. 2) The private keys do not even need to exist at the time of encryption, they can be generated "just in time" by the PKG. #pqc #multilinear #map

    Example Domain

    example.com

  • View organization page for QuantumShield, graphic

    224 followers

    If you work hard and earn a win, you ring the bell. In that spirit we are happy to announce that we have raised additional funding, at a higher valuation than before. Thank you to our new investors and thank you to our existing investors. To say the recent few weeks have been transformational would be quite the understatement. We are now currently closed for new investment, and expect to open up again before EOY one final time before the real priced round. While life doesn't come with insurance and we cannot promise what is to come, the apparent future has become orders of magnitude brighter. If it can be done, it will be done, because it must be done. #celebrate #every #win #ring #the #bell

    • No alternative text description for this image
  • View organization page for QuantumShield, graphic

    224 followers

    In the Loonshot book, which we recommend nobody read (as it could give away our secrets) Safi Bahcall describes the S-type Loonshot as a major change in strategy or process. Think of Netflix... sending DVDs through the mail? What moron came up with that idea? Also described are the P-type Loonshots, the transformational product or technology that nobody believes could ever work, like the steam engine. Locomotion... by boiling water? Where do you even hitch the horses??? Literal insanity. History tells a different story, but intrinsic to both is the idea of the phase change. This is generally modeled using ice, as two forces working against each other to maintain equilibrium. The low energy frozen middle trying freeze more water molecules, and lock them into place, while the higher energy water molecules are trying to become fluid, dynamic, and move. This is an oversimplification, missing a few critical details. First, why does the water want to move once free? Gravity, implying there might be more than two forces at play. Second, you need to consider the environment in which the ice formed, as in nature, there is no such thing as a block of ice that is 100% water. It's easier to model as a block of frozen club soda, full of tiny bubbles of pressurized air. Those bubbles are constantly exerting pressure on the ice, trying to escape from the inside, they just need a little help. To help accelerate the inevitable, you first need to change the external environment. By removing the air from the room, which is way less expensive than heating, one creates a pressure differential, a vacuum that acts to rip the bubbles from the ice. This formerly impenetrable wall of solid ice is now not quite so formidable. It is vulnerable to not only gravity, but its own internal forces trying to break it apart, self convective. You've increased the heat transfer coefficient and primed it to melt. A block of ice that would have taken 3 days to melt if left alone to gradually transition, can now be turned within minutes to a pile of slush in 3 hours. That's boiling ice. This how you melt the wall, with understanding, preparation, and of course a dragon if you have one. Give me six hours to chop down a tree and I will spend the first four sharpening the axe. #loonshot #phasechange #businessphysics

    • No alternative text description for this image
  • View organization page for QuantumShield, graphic

    224 followers

    While our core focus is on cybersecurity, it's import that we highlight our commitment to sustainability and ESG practices. The primary focus being the environmental impact of our business operations, as the S and G in ESG don't really matter if civilization is destroyed by category 8 hurricanes. Also, carbon avoidance credits are a thing, you just need to properly justify and track the impacts. We will be licensing software that demonstrably extends the lifespan of hardware, and you'd be surprised how much carbon it costs to produce new motherboards, laptops, etc. The logistics of moving everything from mineral mine to fabrication to assembly and finally to the customer is a huge part. So, it's hard not to see a future where we are successful and not also minting carbon avoidance credits. This makes us perhaps the only dual-use startup that meets the base ESG standard, but will also have remarkably profitable alternative revenue stream, selling carbon offset credits to the fossil fuel industry. Tesla makes billions off of this. Also, the value of carbon credits is going to outpace inflation over time. Go 'woke', increase the premium on your company to investors by 20% and create a secondary LOB? #ESG #MAXWOKE

  • View organization page for QuantumShield, graphic

    224 followers

    What we're going to miss about the dual-use valley of death: ✔ The solitude. ✔ Being underestimated. ✔ The earthy mouthfeel, notes of plumb and sun bleached bone when the sand when it hits your pallet. ✔ The friends and assorted crazy people you meet along the way. ✔ The 'unlimited vacation' policy. ✔ The extremely low bar that constitutes what is 'commercially reasonable'. ✔ That feeling of exhilaration that only comes from almost dying. What we're not going to miss about the dual-use valley of death: ✔ That almost dying part. ✔ Pretty much everything else. With the advent of AI, you can expect an entire cohort of small R&D focused startups coming out with blockbuster technology. Having successfully navigated this sort of thing before, we're well aware that this is actually the starting line of the race. The values that got us here will get us over the next hill as well. #Ignorance #Resilience #Curiosity #Purpose

  • View organization page for QuantumShield, graphic

    224 followers

    The question seems to have changed in recent days from: “What if the technology doesn’t work?” to “What if it does?” To that, all we can say is…. well, I guess you’ll just have to “wait and see”.

Similar pages