Главная
Study mode:
on
1
Intro
2
Talk Outline
3
Authority Compromise
4
Weak Links
5
Secret Key Portability
6
Everybody Wants In
7
Example: Tor Directory Authority
8
Trust-splitting needs to scale
9
A First Step: Transparency
10
Decentralized Witness Cosigning
11
Schnorr Signature
12
CoSi Response Phase
13
Unavailable Witness Servers
14
Experimental Evaluation
15
Results: Verification Cost
16
Results: Collective Signature Size
17
Existing Transparency Solutions
18
Other uses of collective signing
19
Conclusion
Description:
Explore a 23-minute IEEE conference talk that delves into the innovative CoSi protocol, designed to enhance the security and transparency of critical network authorities. Learn how this scalable witness cosigning protocol ensures that authoritative statements are validated and publicly logged by diverse witnesses before client acceptance. Discover how CoSi protects against undetected exploits and misuse of secret keys, offering a robust defense mechanism even against persistent man-in-the-middle attackers. Examine the protocol's ability to scale to thousands of witnesses through signature aggregation and efficient communication trees. Gain insights into CoSi's practical applications in timestamping and logging authorities, and understand its potential to revolutionize trust models in network security.

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

IEEE
Add to list