Overview
Explore a comprehensive analysis of the Fiat-Shamir heuristic for proofs in this 26-minute conference talk presented at Crypto 2017. Delve into the security aspects, examining both secure and insecure implementations, and investigate negative results and strong assumptions. Learn about prior work in the field, corollaries, and the concept of correlation intractable hash functions. Gain insights into the proof idea and draw meaningful conclusions about the security implications of obfuscation in the context of the Fiat-Shamir transformation for proofs.
Syllabus
Intro
Is it secure
Is it insecure
Negative results
Strong assumptions
Prior work
corollary
correlation intractable hash functions
summary
proof idea
conclusion
Taught by
TheIACR