Overview
This course teaches how to transform traditional X.509 certificates into anonymous credentials using verifiable computation. The learning outcomes include understanding the limitations of the X.509 PKI, creating smaller messages with stronger privacy and integrity, and developing new C libraries for cryptographic verifiability. The course covers topics such as X.509 authentication, privacy issues, using Pinocchio for computation outsourcing, and compiling certificate templates. The teaching method involves lectures and practical applications. The course is intended for individuals interested in enhancing authentication methods, improving privacy, and strengthening integrity in applications such as email and the Web.
Syllabus
Intro
The X.509 Public Key Infrastructure (1988)
X.509 Authentication
X.509 Problem: Privacy
Cinderella: Main Idea
Computation Outsourcing with Pinocchio
Cinderella: Soundness
Compiling Certificate Templates
Application: TLS Client (with Offline Signing)
Conclusions
Taught by
IEEE Symposium on Security and Privacy