Overview
Explore the cutting-edge developments in non-interactive zero-knowledge proofs presented at Asiacrypt 2022. Delve into topics such as adaptive zero knowledge, security against adaptive corruption, and state-of-the-art challenges in the field. Learn about noninteractive user commitments, sigma protocols, and honest verified zero knowledge. Examine the concepts of correlation interactable CI hash functions, triply secure protocols, and adaptive secure protocols. Gain insights into programmability, efficient IDKs, and MPC review. Investigate recurrent list recoverability and understand the implications of bad challenges in cryptographic systems.
Syllabus
Intro
Conclusions
Question
Adaptive using nizk
NonInteractive Zero Knowledge
Adaptive Zero Knowledge
Adaptive Security Against Adaptive Corruption
State of the art
Challenges
Noninteractive user commitment
sigma protocol
honest verified zero knowledge
correlation interactable
CI hash function
Triply secure protocol
Adaptive secure protocol
Summary
Programmability
Efficient IDKs
MPC Review
Bad Challenges
CIHash Function
Recurrent List Recoverability
Recap
Taught by
TheIACR