Главная
Study mode:
on
1
Intro
2
Agenda
3
About Matthew
4
Motivation
5
What are ring signatures
6
What is knowledge proof
7
Card analogy
8
Elliptic Curves
9
Security Crash Course
10
Modular Groups
11
Group Properties
12
Schnoor
13
Simulation
14
Math
15
Contract
16
Message Em
17
The Server
18
Why anonymity is hard
19
kewpie
20
algum
21
ring
22
privacy
Description:
Explore the concept of truly anonymous credentials using modern cryptography in this 44-minute conference talk from Security BSides London. Dive into the world of anonymous networks like Tor and I2P, and learn about a novel authentication system based on homomorphic properties of elliptic curve cryptography and zero knowledge proofs called "Linkable Ring Signatures." Discover how this system allows users to add their public key to a larger group of existing public keys, creating a "ring" that enables anonymous signing while maintaining verifiability. Understand the mathematical principles behind preventing spam and DoS attacks without compromising user anonymity. Follow along as the speaker walks through cryptographic primitives, demonstrates a Tor/I2P-based anti-spam anonymous forum, and explains the security implications of this innovative approach. Gain insights into elliptic curves, modular groups, Schnorr signatures, and the challenges of maintaining privacy in anonymous networks.

Truly Anonymous Credentials Using Modern Cryptography

Security BSides London
Add to list
0:00 / 0:00