Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation

IEEE via YouTube

Overview

This course teaches how to transform traditional X.509 certificates into anonymous credentials using verifiable computation. The learning outcomes include understanding the limitations of the X.509 PKI, creating smaller messages with stronger privacy and integrity, and developing new C libraries for cryptographic verifiability. The course covers topics such as X.509 authentication, privacy issues, using Pinocchio for computation outsourcing, and compiling certificate templates. The teaching method involves lectures and practical applications. The course is intended for individuals interested in enhancing authentication methods, improving privacy, and strengthening integrity in applications such as email and the Web.

Syllabus

Intro
The X.509 Public Key Infrastructure (1988)
X.509 Authentication
X.509 Problem: Privacy
Cinderella: Main Idea
Computation Outsourcing with Pinocchio
Cinderella: Soundness
Compiling Certificate Templates
Application: TLS Client (with Offline Signing)
Conclusions

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.