Lecture

ECDSA Ring Signature

In course
DEMO: dolore ullamco
Sunt ullamco sint labore aliqua excepteur. Aliqua tempor amet esse dolore sint ullamco nisi ullamco nisi nostrud fugiat minim. Dolor sit nisi dolor quis aute ut et tempor aliqua incididunt commodo. Mollit dolor esse ullamco elit quis pariatur id id nulla excepteur. Aute irure minim eu est exercitation. Excepteur occaecat quis Lorem non fugiat incididunt ipsum.
Login to see this section
Description

This lecture introduces the concept of ring signatures as a privacy-enhancing alternative to standard signatures, allowing a user to sign a message without revealing their identity. The instructor explains how ring signatures can be used to ensure anonymity in feedback collection scenarios and discusses the ZK Attest protocol, which leverages zero-knowledge proofs to verify the validity of signatures without exposing the public key. The lecture delves into the technical details of implementing ring signatures using ECDSA keys, highlighting the importance of key establishment and security properties such as anonymity and inforgeability. Additionally, the application of the ZK Attest protocol in group signatures is briefly mentioned, showcasing its versatility in cryptographic applications.

Instructor
tempor ullamco id
Labore velit est amet pariatur. Consectetur velit officia culpa sint elit consequat nulla et fugiat magna consectetur enim veniam fugiat. Duis tempor quis consequat dolore ad non magna irure. Ut aliqua aliqua quis nisi mollit tempor irure velit dolor do ad consectetur Lorem velit. Excepteur laborum nisi dolor tempor. Aute aliqua excepteur Lorem veniam et ea cillum duis ipsum incididunt excepteur tempor ipsum irure. Sit ex commodo id consequat mollit ipsum.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (34)
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.