The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
Offered By: DefCamp via YouTube
Course Description
Overview
Syllabus
Introduction
Symmetric Cryptography
Example
Sharing keys
Asymmetric cryptography
Key exchange
Security goal
DiffieHellman key exchange
DiffieHellman problem
Public encryption
Elgamal encryption
Gamble encryption
Quantum computers
Googles quantum computer
IBM didnt like it
Quantum Supremacy
Quantum Computer Protocol
Hbased digital signatures
Based crypto system
Efficiency
Sidechannel attacks
Digital signature schemes
Onetime signature scheme
Verifying signature
Long signature
Binary tree
Verification keys
Complexity
Goal
Mercury
Vector Commitment
Vector commitments
polynomial commitments
emerging proofs
what are the problems
what to do
novel scheme
signature
schema
questions
algorithms
QA
Hash
Scientific paper
Thank you
Quantum cryptography
Quantum key exchange
Taught by
DefCamp
Related Courses
Advanced Data Structures, RSA and Quantum AlgorithmsUniversity of Colorado Boulder via Coursera Amazon Braket Getting Started
Amazon Web Services via AWS Skill Builder AI and Gen-AI for Supply Chain Management
ISCEA via edX Quantum Computing
Brilliant Building your First Quantum Circuit with Amazon Braket
Amazon Web Services via AWS Skill Builder