Hacker News new | past | comments | ask | show | jobs | submit login

I'd second and generalize to basically any area of research into expanding or applying cryptographic protocols.

There was a fascinating area I read about in grad school focused on deniable database retrieval, an extension of oblivious transfer.

I've long forgotten the papers and they had some efficiency issues, but seemed like the work could be revolutionary if expanded to building routing networks that prioritize privacy and anonymity.

Smarter people than me can point out this is naïve or old or broken or limited in application or otherwise not worth pursuing. I thought it seemed fun at the time though.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: