Cryptography in Distributed Systems
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Accumulators in Digital Identity Management
Digital Identity Management - Authentication
Digital Identity Management - Anonymous Credentials
Digital Identity Management - Accumulator updates
MPC protocols and Implementation
Keyless q-SDH benchmark
Conclusion
Distributed payment systems
Registration
Account Creation in more detail
Anonymity Revocation
Accounts Tracing
Cryptographic Tools and Techniques
Security Analysis
Schnorr Signatures
Signature Aggregation
Application: Compressing Blockchains
Problem Scope
Quick recap: Sigma Protocol for relation R
Sigma Protocol for Pok of Schnorr Signature
Compressing Poks for n discrete logarithm instances
Compressed Sigma Protocol for Pok of n Schnorr Sigs
From Sigma Protocol to Non-interactive Pok
Benchmarks
Apply these constructions
Taught by
RSA Conference
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Certified Information Systems Security Professional (CISSP)
A Cloud Guru CompTIA Security+ Certification Prep
A Cloud Guru Encryption Fundamentals
A Cloud Guru LPIC-3 Exam 303: Security
A Cloud Guru