Cryptography in Distributed Systems
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Accumulators in Digital Identity Management
Digital Identity Management - Authentication
Digital Identity Management - Anonymous Credentials
Digital Identity Management - Accumulator updates
MPC protocols and Implementation
Keyless q-SDH benchmark
Conclusion
Distributed payment systems
Registration
Account Creation in more detail
Anonymity Revocation
Accounts Tracing
Cryptographic Tools and Techniques
Security Analysis
Schnorr Signatures
Signature Aggregation
Application: Compressing Blockchains
Problem Scope
Quick recap: Sigma Protocol for relation R
Sigma Protocol for Pok of Schnorr Signature
Compressing Poks for n discrete logarithm instances
Compressed Sigma Protocol for Pok of n Schnorr Sigs
From Sigma Protocol to Non-interactive Pok
Benchmarks
Apply these constructions
Taught by
RSA Conference
Related Courses
LadderLeakTheIACR via YouTube On Instantiating the Algebraic Group Model from Falsifiable Assumptions
TheIACR via YouTube Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
TheIACR via YouTube Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
IEEE via YouTube Crypto 2023 Best Paper Plenary - Fast Lattice Reduction and Adaptive Schnorr Signatures
TheIACR via YouTube