YoVDO

Threshold Ring Signatures: New Definitions and Post-Quantum Security

Offered By: TheIACR via YouTube

Tags

Anonymity Courses

Course Description

Overview

Explore threshold ring signatures, their new definitions, and post-quantum security in this conference talk presented at PKC 2020. Delve into the paper by Abida Haque and Alessandra Scafuro, covering topics such as passive adversaries, post-quantum hardness assumptions, and proof techniques in post-quantum settings. Examine anonymity and unforgeability definitions, oracles, and post-quantum secure problems. Learn about key techniques including trapdoor commitment schemes, Shamir secret sharing, and the Unruh transformation. Conclude with a summary and questions for future research in this cutting-edge cryptographic field.

Syllabus

Intro
Motivation
Threshold Ring Signature Setting
Passive Adversaries
Post-Quantum Hardness Assumptions
Proof Techniques in Post-Quantum Setting
Rewinding
Quantum vs Classical Access
Definitions
Anonymity and Unforgeability
Oracles
Post-Quantum Secure Problem and Technique
Trapdoor Commitment Scheme
Shamir Secret Sharing
Protocol
Template
Core Technique
Unruh Transformation
Summary
Questions for Future Research


Taught by

TheIACR

Related Courses

Information Security - Advanced topics
New York University (NYU) via edX
The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy
Ethical Hacking With Python, JavaScript and Kali Linux
Udemy
Dark Web: Complete Introduction to the Deep/Dark Web 2023
Udemy
Universidad Hacking. Todo en Ciberseguridad. Curso Completo
Udemy