Cryptography in Distributed Systems
Offered By: RSA Conference via YouTube
Course Description
Overview
Syllabus
Intro
Accumulators in Digital Identity Management
Digital Identity Management - Authentication
Digital Identity Management - Anonymous Credentials
Digital Identity Management - Accumulator updates
MPC protocols and Implementation
Keyless q-SDH benchmark
Conclusion
Distributed payment systems
Registration
Account Creation in more detail
Anonymity Revocation
Accounts Tracing
Cryptographic Tools and Techniques
Security Analysis
Schnorr Signatures
Signature Aggregation
Application: Compressing Blockchains
Problem Scope
Quick recap: Sigma Protocol for relation R
Sigma Protocol for Pok of Schnorr Signature
Compressing Poks for n discrete logarithm instances
Compressed Sigma Protocol for Pok of n Schnorr Sigs
From Sigma Protocol to Non-interactive Pok
Benchmarks
Apply these constructions
Taught by
RSA Conference
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube