Completed
Tools: Compute-and-Compare (CC) Obfuscation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Postquantum Zero-Knowledge in Constant Rounds
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 ZK against quantum attacks
- 3 The Round Complexity of ZK
- 4 Results
- 5 Main focus: Extractable Commitments
- 6 Quantumly-Extractable (Classical) Commitments
- 7 Traditional Extraction Techniques
- 8 The gap from classical techniques: Cloning No Cloning
- 9 Tools: Quantum Fully-Homomorphic Encryption
- 10 Tools: Compute-and-Compare (CC) Obfuscation
- 11 Simplification: Explainable Adversaries
- 12 st Try : No-Cloning Extraction
- 13 Tools: Circuit-Private FHE (SFE)
- 14 nd Try : No-Cloning Extraction
- 15 Problem: Malleability
- 16 rd (and last) Try: No-Cloning Extraction