Главная
Study mode:
on
1
Intro
2
Accumulators in Digital Identity Management
3
Digital Identity Management - Authentication
4
Digital Identity Management - Anonymous Credentials
5
Digital Identity Management - Accumulator updates
6
MPC protocols and Implementation
7
Keyless q-SDH benchmark
8
Conclusion
9
Distributed payment systems
10
Registration
11
Account Creation in more detail
12
Anonymity Revocation
13
Accounts Tracing
14
Cryptographic Tools and Techniques
15
Security Analysis
16
Schnorr Signatures
17
Signature Aggregation
18
Application: Compressing Blockchains
19
Problem Scope
20
Quick recap: Sigma Protocol for relation R
21
Sigma Protocol for Pok of Schnorr Signature
22
Compressing Poks for n discrete logarithm instances
23
Compressed Sigma Protocol for Pok of n Schnorr Sigs
24
From Sigma Protocol to Non-interactive Pok
25
Benchmarks
26
Apply these constructions
Description:
Explore cutting-edge cryptography applications in distributed systems through this RSA Conference session. Delve into multi-party revocation in Sovrin, examining performance improvements through distributed trust. Investigate the balance between privacy and accountability in blockchain identity management. Learn about non-interactive half-aggregation of EdDSA and Schnorr signature variants. Gain insights into accumulators in digital identity management, MPC protocols, keyless q-SDH benchmarks, distributed payment systems, and anonymous credentials. Analyze security aspects, Schnorr signatures, and signature aggregation techniques. Discover how to compress blockchains and understand the intricacies of Sigma Protocols for discrete logarithm instances and Schnorr signature proofs of knowledge.

Cryptography in Distributed Systems

RSA Conference
Add to list