"Rhapsody in Zero Knowledge: Proving Without Revealing" by Tony Arcieri
What does it mean to prove something? Propositional logic requires we reveal propositions and then prove them true, but what if it were possible to create proofs which reveal nothing but their own validity? This is the core idea behind the emergent field of zero knowledge proofs: a decades old solution to a problem we didn't even know existed yet. As we increasingly turn to machine learning to solve problems related to security, such as detecting frauds, fakes, or other threat actors, solutions increasingly rely on accumulating massive amounts of personal data, undermining privacy and risking data breaches. This talk is about how we don't have to sacrifice privacy to get security, and the potential power of constraints, complexity, and universal verifiable computation, and assumes no prior knowledge of cryptography or proof systems.
Tony Arcieri
iqlusion
@bascule
Co-founder @iqlusioninc, formerly @square @chain. Cryptography dilettante, polyglot programmer, key management wrangler, and infrastructure security specialist
Видео "Rhapsody in Zero Knowledge: Proving Without Revealing" by Tony Arcieri канала Strange Loop Conference
Tony Arcieri
iqlusion
@bascule
Co-founder @iqlusioninc, formerly @square @chain. Cryptography dilettante, polyglot programmer, key management wrangler, and infrastructure security specialist
Видео "Rhapsody in Zero Knowledge: Proving Without Revealing" by Tony Arcieri канала Strange Loop Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
"Inside the Wizard Research Engine" by Ben L. Titzer"How to Avoid Safety Hazards when using Closures in Scala" by Philipp Haller (Strange Loop 2022)"Gershwin: Stack-based, Concatenative Clojure" by Daniel Gregoire (2013)"Web Apps in Clojure and ClojureScript with Pedestal" by Brenton Ashworth (2013)"Learnfun and Playfun: A Nintendo automation system" by Tom Murphy VII (2013)"Patterns for Scalable Web Services in Go" by Richard Crowley (2013)"How we've made a global search engine for genetic data" by Miro Cupak"If Gaudí Had a Cluster" by Max Grigorev, Jen Carlile"Spores: Distributable Functions in Scala" by Heather Miller (2013)"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022)"Storytelling with your data" by Aysegul Yonet"Continuum: A JS (ES6) VM Written in JS (ES3)" by Brandon Benvie (2013)"Aesthetic Engine 2" by Vladimir Mitrovic"Privacy Governance & Explainability in ML/AI" by Jared Maslin"Concurrency and Parallel Computing in JavaScript" by Stephan Herhut (2013)"Building a Multi-Master Distributed Redis in Erlang" by Chad DePue (2013)"Making Webapps Collaborative with Composable CRDTs" by Matthew Weidner and Heather Miller"The Future of Conferences" by Cristina (Crista) Lopes"Is It A Bug Or Is It A Story?" by Nicola Hughes"Your Secrets are Safe with Julia: A Compiler for Secure Computation" by Jason Dagit"The JavaScript Interpreter, Interpreted" by Martha Girdler (2013)