Keeping Secrets with Zero Knowledge Proof Stephanie Lin 6.UAP Concept Talk 1.

Slides:



Advertisements
Similar presentations
A Verifiable Secret Shuffle of Homomorphic Encryptions Jens Groth UCLA On ePrint archive:
Advertisements

Take the Time…..
Zero Knowledge Proofs(2) Suzanne van Wijk & Maaike Zwart
CONDITIONAL SENTENCES: FIRST CONDITIONAL. Conditional Sentences.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
How to Delegate Computations: The Power of No-Signaling Proofs Ran Raz (Weizmann Institute & IAS) Joint work with: Yael Tauman Kalai Ron Rothblum.
Lecture 15 Zero-Knowledge Techniques. Peggy: “I know the password to the Federal Reserve System computer, the ingredients in McDonald’s secret sauce,
An Ideal Friend Friends. Considerate, brainy. Supportive, loyal, responsible, Who you are never bored with. Friends.
Zero-Knowledge Proofs J.W. Pope M.S. – Mathematics May 2004.
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs.
Social Capital and Student Achievement in Norwegian Secondary Schools Paper submitted to QMSS conference in Prag June 2007.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Sedgewick & Wayne (2004); Chazelle (2005) Sedgewick & Wayne (2004); Chazelle (2005)
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Sedgewick & Wayne (2004); Chazelle (2005) Sedgewick & Wayne (2004); Chazelle (2005)
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Online Safety- Tips For the Internet WELCOMETOTHEINTERNET WELCOME TO THE INTERNET! The internet is a fun place to talk to friends or research things.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
1 SC700 A2 Internet Information Protocols 3/20/2001 Paper Presentation by J. Chu How to Explain Zero-Knowledge Protocols to Your Children.
WHY I SHOULD GET AN IPHONE 4S BY: MATTHEW BLOODGOOD.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
By: Stephanie H..  m+Corning+Ar&ie=UTF- 8&ei=zlX6UqWVLcidyQGN7YH4Ag&ved=0CAcQ_AUoAQ
Cryptography is the process of encryption and decryption a message or data. Examples: Banking to keep peoples money safe Schools so we can keep students.
 Http  Edu  Net  Gov  Org These are just some of them without these pass the site by!
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Saying thank you Saying sorry. Thank you / Sorry + for We use gerunds (-ing words) or nouns after for. Thank you I want to thank you We are sorry for.
By Evan Stevens   I know now that I should never talk to any strangers online and that I should be a good online citizen and to never swear or talk.
Do Now #6 If you could change anything about your life right now, what would it be? ch?v=zLYECIjmnQs
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
 This is nothing new and it is not your first year in school we are just continuing on from where you left off in elementary school. Basic Rules For Mr.
The safe guide to staying safe on social media and your age limit for videos.
Questions ? ? ? ? ? ? ? Do you use the internet to talk to your friends?
Zero Knowledge r Two parties:  All powerful prover P  Polynomially bounded verifier V r P wants to prove a statement to V with the following properties:
IP, (NON)ISOGRAPH and Zero Knowledge Protocol COSC 6111 Advanced Algorithm Design and Analysis Daniel Stübig.
Topic 36: Zero-Knowledge Proofs
Take the Time…...
The impact of domestic abuse on children What children and young people tell us Mullender et. al. (2002)
Acceptable Use Policy for Pupils
Friends: Doris Lee Demi Chen Andrea Fan Rachel Lin
Modes of Persuasion King Eng. 6
My Digital Footprint By: Alyssa.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Zero-Knowledge Proofs
Суури мэдлэг Basic Knowledge
Take the Time…...
E-safety!!! How to be safe on the internet?!!!
E SAFETY ASSEMBLY.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
2.2.3 Friendships: Online/Offline
4 + (-5) = A. Start at zero B. Move ______ spaces ___________ to get to the first number. C. From there, move _____ spaces __________ D. My final answer.
How Might your digital footprint affect your future opportunities By: Kaden Tarry It will give information about my soccer team so it would be good for.
09 Zero Knowledge Proof Hi All, One more topic to go!

3.1.1 My body now: Names of parts of my body
Click Aware Safer Internet Day.
Social Media Dangers.
My High School Portfolio
Zero-Knowledge Proofs
3.1.1 My body now: Names of parts of my body
Schools Linking Supporting our children to explore identity, celebrate diversity, champion equality and promote community.
Cryptology Design Fundamentals
Cryptology Design Fundamentals
How might your digital footprint affect your future opportunities?
My body now: Names of parts of my body
My body now: Names of parts of my body
100% Pure Study Material For Microsoft AZ-900 Pdf Dumps
Get Valid Pmi-Acp Dumps Pdf | Pmi-Acp Exam question
This presentation uses a free template provided by FPPT.com Never Give-up For Exams With Precise Microsoft Dumps.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Keeping Secrets with Zero Knowledge Proof Stephanie Lin 6.UAP Concept Talk 1

You have a Secret! 2 Your Friend You The Secret

The Cave 3Jean-Jacques, et al

The Proof 4Jean-Jacques, et al

Probability 5 Passes Tests and Does Not Have Secret P – Uses Secret N – Does not Use Secret ½ ¼ ⅛

Correctness 6 A cheating prover, one without the secret, can only convince the the verifier with a small probability. A cheating verifier will not learn anything he did not know before the tests, by watching the tests.

Real World Use 7 Authentication on the Internet BankerYou Who Are You? I am Stephanie. I am Stephanie. How do I know you are Stephanie? I have this bank pin that only I know.

8 My secret is safe.