YoVDO

Truly Anonymous Credentials Using Modern Cryptography

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Cryptography Courses Elliptic Curve Cryptography Courses Zero-Knowledge Proofs Courses

Course Description

Overview

Explore the concept of truly anonymous credentials using modern cryptography in this 44-minute conference talk from Security BSides London. Dive into the world of anonymous networks like Tor and I2P, and learn about a novel authentication system based on homomorphic properties of elliptic curve cryptography and zero knowledge proofs called "Linkable Ring Signatures." Discover how this system allows users to add their public key to a larger group of existing public keys, creating a "ring" that enables anonymous signing while maintaining verifiability. Understand the mathematical principles behind preventing spam and DoS attacks without compromising user anonymity. Follow along as the speaker walks through cryptographic primitives, demonstrates a Tor/I2P-based anti-spam anonymous forum, and explains the security implications of this innovative approach. Gain insights into elliptic curves, modular groups, Schnorr signatures, and the challenges of maintaining privacy in anonymous networks.

Syllabus

Intro
Agenda
About Matthew
Motivation
What are ring signatures
What is knowledge proof
Card analogy
Elliptic Curves
Security Crash Course
Modular Groups
Group Properties
Schnoor
Simulation
Math
Contract
Message Em
The Server
Why anonymity is hard
kewpie
algum
ring
privacy


Taught by

Security BSides London

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
SSL, TLS and HTTPS Overview
Bogdan Stashchuk via YouTube
Overview of Elliptic Curve Isogenies Based Public Key Cryptography Assumptions
Simons Institute via YouTube
Crypto 101 - An Intro to Real World Crypto
YouTube
Elliptic Curve Cryptography for Those Who Are Afraid of Math
Security BSides San Francisco via YouTube