Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the cutting-edge developments in non-interactive zero-knowledge proofs presented at Asiacrypt 2022. Delve into topics such as adaptive zero knowledge, security against adaptive corruption, and state-of-the-art challenges in the field. Learn about noninteractive user commitments, sigma protocols, and honest verified zero knowledge. Examine the concepts of correlation interactable CI hash functions, triply secure protocols, and adaptive secure protocols. Gain insights into programmability, efficient IDKs, and MPC review. Investigate recurrent list recoverability and understand the implications of bad challenges in cryptographic systems.
Syllabus
Intro
Conclusions
Question
Adaptive using nizk
NonInteractive Zero Knowledge
Adaptive Zero Knowledge
Adaptive Security Against Adaptive Corruption
State of the art
Challenges
Noninteractive user commitment
sigma protocol
honest verified zero knowledge
correlation interactable
CI hash function
Triply secure protocol
Adaptive secure protocol
Summary
Programmability
Efficient IDKs
MPC Review
Bad Challenges
CIHash Function
Recurrent List Recoverability
Recap
Taught by
TheIACR
Related Courses
Homomorphic Signatures and Pre-Processing NIZKSimons Institute via YouTube Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
Association for Computing Machinery (ACM) via YouTube On QA-NIZK in the BPK Model
TheIACR via YouTube Compact NIZKs from Standard Assumptions on Bilinear Maps
TheIACR via YouTube Security of the J-PAKE Password-Authenticated Key Exchange Protocol
IEEE via YouTube