I'd second and generalize to basically any area of research into expanding or applying cryptographic protocols.
There was a fascinating area I read about in grad school focused on deniable database retrieval, an extension of oblivious transfer.
I've long forgotten the papers and they had some efficiency issues, but seemed like the work could be revolutionary if expanded to building routing networks that prioritize privacy and anonymity.
Smarter people than me can point out this is naïve or old or broken or limited in application or otherwise not worth pursuing. I thought it seemed fun at the time though.
There was a fascinating area I read about in grad school focused on deniable database retrieval, an extension of oblivious transfer.
I've long forgotten the papers and they had some efficiency issues, but seemed like the work could be revolutionary if expanded to building routing networks that prioritize privacy and anonymity.
Smarter people than me can point out this is naïve or old or broken or limited in application or otherwise not worth pursuing. I thought it seemed fun at the time though.