Explore a comprehensive presentation from DefCamp 2022 on post-quantum signature models using Verkle Trees. Delve into the intricacies of symmetric and asymmetric cryptography, key exchange protocols, and the impact of quantum computing on cybersecurity. Learn about Diffie-Hellman key exchange, ElGamal encryption, and the concept of quantum supremacy. Examine hash-based digital signatures, side-channel attacks, and one-time signature schemes. Investigate vector commitments, polynomial commitments, and emerging proofs in the context of post-quantum cryptography. Gain insights into novel signature schemes and algorithms designed to withstand quantum threats. This 35-minute talk, delivered by Maksim Iavich, President of Scientific Cyber Security Association and Director of Cyber Security Center at Caucasus University, offers a deep dive into cutting-edge cryptographic techniques for the post-quantum era.
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022