Lead AI-Native Products with Microsoft's Agentic AI Program
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore threshold ring signatures, their new definitions, and post-quantum security in this conference talk presented at PKC 2020. Delve into the paper by Abida Haque and Alessandra Scafuro, covering topics such as passive adversaries, post-quantum hardness assumptions, and proof techniques in post-quantum settings. Examine anonymity and unforgeability definitions, oracles, and post-quantum secure problems. Learn about key techniques including trapdoor commitment schemes, Shamir secret sharing, and the Unruh transformation. Conclude with a summary and questions for future research in this cutting-edge cryptographic field.
Syllabus
Intro
Motivation
Threshold Ring Signature Setting
Passive Adversaries
Post-Quantum Hardness Assumptions
Proof Techniques in Post-Quantum Setting
Rewinding
Quantum vs Classical Access
Definitions
Anonymity and Unforgeability
Oracles
Post-Quantum Secure Problem and Technique
Trapdoor Commitment Scheme
Shamir Secret Sharing
Protocol
Template
Core Technique
Unruh Transformation
Summary
Questions for Future Research
Taught by
TheIACR