Completed
Keyless q-SDH benchmark
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography in Distributed Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Accumulators in Digital Identity Management
- 3 Digital Identity Management - Authentication
- 4 Digital Identity Management - Anonymous Credentials
- 5 Digital Identity Management - Accumulator updates
- 6 MPC protocols and Implementation
- 7 Keyless q-SDH benchmark
- 8 Conclusion
- 9 Distributed payment systems
- 10 Registration
- 11 Account Creation in more detail
- 12 Anonymity Revocation
- 13 Accounts Tracing
- 14 Cryptographic Tools and Techniques
- 15 Security Analysis
- 16 Schnorr Signatures
- 17 Signature Aggregation
- 18 Application: Compressing Blockchains
- 19 Problem Scope
- 20 Quick recap: Sigma Protocol for relation R
- 21 Sigma Protocol for Pok of Schnorr Signature
- 22 Compressing Poks for n discrete logarithm instances
- 23 Compressed Sigma Protocol for Pok of n Schnorr Sigs
- 24 From Sigma Protocol to Non-interactive Pok
- 25 Benchmarks
- 26 Apply these constructions