Cryptography in Distributed Systems
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Accumulators in Digital Identity Management
Digital Identity Management - Authentication
Digital Identity Management - Anonymous Credentials
Digital Identity Management - Accumulator updates
MPC protocols and Implementation
Keyless q-SDH benchmark
Conclusion
Distributed payment systems
Registration
Account Creation in more detail
Anonymity Revocation
Accounts Tracing
Cryptographic Tools and Techniques
Security Analysis
Schnorr Signatures
Signature Aggregation
Application: Compressing Blockchains
Problem Scope
Quick recap: Sigma Protocol for relation R
Sigma Protocol for Pok of Schnorr Signature
Compressing Poks for n discrete logarithm instances
Compressed Sigma Protocol for Pok of n Schnorr Sigs
From Sigma Protocol to Non-interactive Pok
Benchmarks
Apply these constructions
Taught by
RSA Conference
Related Courses
Advanced Operating SystemsGeorgia Institute of Technology via Udacity High Performance Computing
Georgia Institute of Technology via Udacity GT - Refresher - Advanced OS
Georgia Institute of Technology via Udacity Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX CS125x: Advanced Distributed Machine Learning with Apache Spark
University of California, Berkeley via edX