The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
Offered By: DefCamp via YouTube
Course Description
Overview
Syllabus
Introduction
Symmetric Cryptography
Example
Sharing keys
Asymmetric cryptography
Key exchange
Security goal
DiffieHellman key exchange
DiffieHellman problem
Public encryption
Elgamal encryption
Gamble encryption
Quantum computers
Googles quantum computer
IBM didnt like it
Quantum Supremacy
Quantum Computer Protocol
Hbased digital signatures
Based crypto system
Efficiency
Sidechannel attacks
Digital signature schemes
Onetime signature scheme
Verifying signature
Long signature
Binary tree
Verification keys
Complexity
Goal
Mercury
Vector Commitment
Vector commitments
polynomial commitments
emerging proofs
what are the problems
what to do
novel scheme
signature
schema
questions
algorithms
QA
Hash
Scientific paper
Thank you
Quantum cryptography
Quantum key exchange
Taught by
DefCamp
Related Courses
Quantum Information Science II: Efficient Quantum Computing - fault tolerance and complexityMassachusetts Institute of Technology via edX Quantum Supremacy - Benchmarking the Sycamore Processor
TensorFlow via YouTube The Problem with Qubits
Simons Institute via YouTube Quantum Supremacy via Boson Sampling: Theory and Practice - Quantum Colloquium
Simons Institute via YouTube The Power of Random Quantum Circuits
Simons Institute via YouTube