Cryptography in Distributed Systems

Cryptography in Distributed Systems

RSA Conference via YouTube Direct link

Application: Compressing Blockchains

18 of 26

18 of 26

Application: Compressing Blockchains

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cryptography in Distributed Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Accumulators in Digital Identity Management
  3. 3 Digital Identity Management - Authentication
  4. 4 Digital Identity Management - Anonymous Credentials
  5. 5 Digital Identity Management - Accumulator updates
  6. 6 MPC protocols and Implementation
  7. 7 Keyless q-SDH benchmark
  8. 8 Conclusion
  9. 9 Distributed payment systems
  10. 10 Registration
  11. 11 Account Creation in more detail
  12. 12 Anonymity Revocation
  13. 13 Accounts Tracing
  14. 14 Cryptographic Tools and Techniques
  15. 15 Security Analysis
  16. 16 Schnorr Signatures
  17. 17 Signature Aggregation
  18. 18 Application: Compressing Blockchains
  19. 19 Problem Scope
  20. 20 Quick recap: Sigma Protocol for relation R
  21. 21 Sigma Protocol for Pok of Schnorr Signature
  22. 22 Compressing Poks for n discrete logarithm instances
  23. 23 Compressed Sigma Protocol for Pok of n Schnorr Sigs
  24. 24 From Sigma Protocol to Non-interactive Pok
  25. 25 Benchmarks
  26. 26 Apply these constructions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.