Главная
Study mode:
on
1
Intro
2
Ark Pack Practical Snark Aggregation
3
What are Proof Systems
4
Proof Systems in Decentralized Systems
5
Aggregation
6
Bilinear Groups
7
Construction
8
Trusted Setup
9
Commitments
10
Snackpack
11
Sniper Optimization
12
Next steps
13
Policy Enforcement
14
Zero Knowledge Proof
15
Zero Knowledge Middle Box
16
Review of requirements
17
Zero Knowledge Proof Machinery
18
Key Consistency Check
19
Filtering Encrypted DNS
20
What is DNS
21
Childrens Internet Protection Law
22
Benchmarks
23
Ongoing work
24
Conclusion
25
Introduction
26
Heartbleed
27
Key Extraction
28
Publish Private Key
29
Publish on GitHub
30
Key Leakage Resilience
31
Forward Security
32
NonInteractive Forward Security
33
Epochbased Forward Security
34
punctual encryption
35
puncture encryption
36
crypto literature
37
geokey manager
38
financial crypto
Description:
Explore zero knowledge proofs, forward secrecy, and advanced cryptographic concepts in this comprehensive 1-hour 12-minute lecture. Delve into proof systems, their applications in decentralized systems, and aggregation techniques. Examine bilinear groups, trusted setups, and commitments. Learn about Snarkpack, Sniper optimization, and policy enforcement in zero-knowledge systems. Investigate zero-knowledge middleboxes, encrypted DNS filtering, and key consistency checks. Understand the implications of the Children's Internet Protection Law and review relevant benchmarks. Analyze the Heartbleed vulnerability, key extraction techniques, and strategies for key leakage resilience. Explore forward security, non-interactive forward security, and epoch-based forward security. Discover punctual encryption, geokey management, and their applications in financial cryptography.

Zero Knowledge and Forward Secrecy

TheIACR
Add to list
0:00 / 0:00