Postquantum Zero-Knowledge in Constant Rounds

Postquantum Zero-Knowledge in Constant Rounds

Association for Computing Machinery (ACM) via YouTube Direct link

Traditional Extraction Techniques

7 of 16

7 of 16

Traditional Extraction Techniques

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Postquantum Zero-Knowledge in Constant Rounds

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 ZK against quantum attacks
  3. 3 The Round Complexity of ZK
  4. 4 Results
  5. 5 Main focus: Extractable Commitments
  6. 6 Quantumly-Extractable (Classical) Commitments
  7. 7 Traditional Extraction Techniques
  8. 8 The gap from classical techniques: Cloning No Cloning
  9. 9 Tools: Quantum Fully-Homomorphic Encryption
  10. 10 Tools: Compute-and-Compare (CC) Obfuscation
  11. 11 Simplification: Explainable Adversaries
  12. 12 st Try : No-Cloning Extraction
  13. 13 Tools: Circuit-Private FHE (SFE)
  14. 14 nd Try : No-Cloning Extraction
  15. 15 Problem: Malleability
  16. 16 rd (and last) Try: No-Cloning Extraction

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.