Completed
Sigma Protocol for Pok of Schnorr Signature
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography in Distributed Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Accumulators in Digital Identity Management
- 3 Digital Identity Management - Authentication
- 4 Digital Identity Management - Anonymous Credentials
- 5 Digital Identity Management - Accumulator updates
- 6 MPC protocols and Implementation
- 7 Keyless q-SDH benchmark
- 8 Conclusion
- 9 Distributed payment systems
- 10 Registration
- 11 Account Creation in more detail
- 12 Anonymity Revocation
- 13 Accounts Tracing
- 14 Cryptographic Tools and Techniques
- 15 Security Analysis
- 16 Schnorr Signatures
- 17 Signature Aggregation
- 18 Application: Compressing Blockchains
- 19 Problem Scope
- 20 Quick recap: Sigma Protocol for relation R
- 21 Sigma Protocol for Pok of Schnorr Signature
- 22 Compressing Poks for n discrete logarithm instances
- 23 Compressed Sigma Protocol for Pok of n Schnorr Sigs
- 24 From Sigma Protocol to Non-interactive Pok
- 25 Benchmarks
- 26 Apply these constructions