YoVDO

Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Hash Functions Courses Non-Interactive Zero-Knowledge Proofs Courses Adaptive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the cutting-edge developments in non-interactive zero-knowledge proofs presented at Asiacrypt 2022. Delve into topics such as adaptive zero knowledge, security against adaptive corruption, and state-of-the-art challenges in the field. Learn about noninteractive user commitments, sigma protocols, and honest verified zero knowledge. Examine the concepts of correlation interactable CI hash functions, triply secure protocols, and adaptive secure protocols. Gain insights into programmability, efficient IDKs, and MPC review. Investigate recurrent list recoverability and understand the implications of bad challenges in cryptographic systems.

Syllabus

Intro
Conclusions
Question
Adaptive using nizk
NonInteractive Zero Knowledge
Adaptive Zero Knowledge
Adaptive Security Against Adaptive Corruption
State of the art
Challenges
Noninteractive user commitment
sigma protocol
honest verified zero knowledge
correlation interactable
CI hash function
Triply secure protocol
Adaptive secure protocol
Summary
Programmability
Efficient IDKs
MPC Review
Bad Challenges
CIHash Function
Recurrent List Recoverability
Recap


Taught by

TheIACR

Related Courses

Homomorphic Signatures and Pre-Processing NIZK
Simons Institute via YouTube
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Association for Computing Machinery (ACM) via YouTube
On QA-NIZK in the BPK Model
TheIACR via YouTube
Compact NIZKs from Standard Assumptions on Bilinear Maps
TheIACR via YouTube
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
IEEE via YouTube