Overview
Syllabus
Intro
Accumulators in Digital Identity Management
Digital Identity Management - Authentication
Digital Identity Management - Anonymous Credentials
Digital Identity Management - Accumulator updates
MPC protocols and Implementation
Keyless q-SDH benchmark
Conclusion
Distributed payment systems
Registration
Account Creation in more detail
Anonymity Revocation
Accounts Tracing
Cryptographic Tools and Techniques
Security Analysis
Schnorr Signatures
Signature Aggregation
Application: Compressing Blockchains
Problem Scope
Quick recap: Sigma Protocol for relation R
Sigma Protocol for Pok of Schnorr Signature
Compressing Poks for n discrete logarithm instances
Compressed Sigma Protocol for Pok of n Schnorr Sigs
From Sigma Protocol to Non-interactive Pok
Benchmarks
Apply these constructions
Taught by
RSA Conference