Overview
Explore threshold ring signatures, their new definitions, and post-quantum security in this conference talk presented at PKC 2020. Delve into the paper by Abida Haque and Alessandra Scafuro, covering topics such as passive adversaries, post-quantum hardness assumptions, and proof techniques in post-quantum settings. Examine anonymity and unforgeability definitions, oracles, and post-quantum secure problems. Learn about key techniques including trapdoor commitment schemes, Shamir secret sharing, and the Unruh transformation. Conclude with a summary and questions for future research in this cutting-edge cryptographic field.
Syllabus
Intro
Motivation
Threshold Ring Signature Setting
Passive Adversaries
Post-Quantum Hardness Assumptions
Proof Techniques in Post-Quantum Setting
Rewinding
Quantum vs Classical Access
Definitions
Anonymity and Unforgeability
Oracles
Post-Quantum Secure Problem and Technique
Trapdoor Commitment Scheme
Shamir Secret Sharing
Protocol
Template
Core Technique
Unruh Transformation
Summary
Questions for Future Research
Taught by
TheIACR