34 \end{frame} |
34 \end{frame} |
35 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
35 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
36 |
36 |
37 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
37 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
38 \begin{frame}[c] |
38 \begin{frame}[c] |
39 \frametitle{Problems with Car Keys} |
39 \frametitle{Problems with Key Fobs} |
40 |
40 |
41 \begin{center} |
41 \begin{columns} |
|
42 \begin{column}[T]{4cm} |
42 \includegraphics[scale=0.4]{../pics/car-standard.jpg} |
43 \includegraphics[scale=0.4]{../pics/car-standard.jpg} |
|
44 \end{column} |
|
45 |
|
46 \begin{column}[T]{6cm} |
|
47 \begin{itemize} |
|
48 \item (I learned) jamming the closing |
|
49 signal |
|
50 \item relay signals\pause |
|
51 \item use diagnostic port to program |
|
52 blank keys |
|
53 \end{itemize} |
|
54 \end{column} |
|
55 \end{columns} |
|
56 |
|
57 \end{frame} |
|
58 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
59 |
|
60 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
61 \begin{frame}[c] |
|
62 \frametitle{Hashes for History} |
|
63 |
|
64 Q: What is the hash for? |
|
65 |
|
66 \begin{center} |
|
67 \includegraphics[scale=0.4]{../pics/Dismantling_Megamos_Crypto.png} |
43 \end{center} |
68 \end{center} |
44 |
69 |
45 \end{frame} |
70 \end{frame} |
46 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
71 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
47 |
72 |
84 |
109 |
85 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
110 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
86 \begin{frame}[c] |
111 \begin{frame}[c] |
87 \frametitle{Zero-Knowledge Proofs} |
112 \frametitle{Zero-Knowledge Proofs} |
88 |
113 |
89 Two remarkable properties of \alert{Zero-Knowledge Proofs}:\bigskip |
114 Two remarkable properties of \alert{Zero-Knowledge |
90 |
115 Proofs}:\bigskip |
91 \begin{itemize} |
116 |
92 \item Alice only reveals the fact that she knows a secret, not the secret itself (meaning |
117 \begin{itemize} |
93 she can convince Bob that she knows the secret).\bigskip |
118 |
94 \item Having been convinced, Bob cannot use the evidence in order to convince Carol |
119 \item Alice only reveals the fact that she knows a secret, not |
95 that Alice knows the secret. |
120 the secret itself (meaning she can convince Bob that she |
96 \end{itemize} |
121 knows the secret, but does not give it to him).\bigskip |
97 |
122 \item Having been convinced, Bob cannot use the evidence in |
98 \end{frame} |
123 order to convince Carol that Alice knows the secret. |
99 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
124 |
100 |
125 \end{itemize} |
101 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
126 |
102 \mode<presentation>{ |
127 \end{frame} |
|
128 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
129 |
|
130 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
131 \begin{frame}[c] |
|
132 \frametitle{Interactive Protocols} |
|
133 |
|
134 Q: How to cut a cake into two equal slices? |
|
135 |
|
136 \begin{center} |
|
137 \includegraphics[scale=0.15]{../pics/cake.jpg} |
|
138 \end{center} |
|
139 |
|
140 \end{frame} |
|
141 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
142 |
|
143 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
103 \begin{frame}[t] |
144 \begin{frame}[t] |
104 \frametitle{\begin{tabular}{@{}c@{}}The Idea \end{tabular}} |
145 \frametitle{The Idea} |
105 |
146 |
106 \begin{center} |
147 \begin{center} |
107 \begin{tabular}{l@{\hspace{10mm}}r} |
148 \begin{tabular}{l@{\hspace{10mm}}r} |
108 \\[-10mm] |
149 \\[-10mm] |
109 \raisebox{10mm}{\large 1.} & \includegraphics[scale=0.1]{../pics/alibaba1.png}\\ |
150 \raisebox{10mm}{\large 1.} & \includegraphics[scale=0.1]{../pics/alibaba1.png}\\ |
117 \end{textblock} |
158 \end{textblock} |
118 |
159 |
119 \small |
160 \small |
120 \only<2>{ |
161 \only<2>{ |
121 \begin{textblock}{12}(2,13.3) |
162 \begin{textblock}{12}(2,13.3) |
122 Even if Bob has a hidden camera, a recording will not be convincing to anyone else |
163 Even if Bob has a hidden camera, a recording will not be |
123 (Alice and Bob could have made it all up). |
164 convincing to anyone else (Alice and Bob could have made it |
|
165 all up). |
124 \end{textblock}} |
166 \end{textblock}} |
125 \only<3>{ |
167 \only<3>{ |
126 \begin{textblock}{12}(2,13.3) |
168 \begin{textblock}{12}(2,13.3) |
127 Even worse, an observer present at the experiment would not be convinced. |
169 Even worse, an observer present at the experiment would not be |
|
170 convinced. |
128 \end{textblock}} |
171 \end{textblock}} |
129 |
172 |
130 \end{frame}} |
173 \end{frame} |
131 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
174 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
132 |
175 |
133 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
176 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
134 \mode<presentation>{ |
|
135 \begin{frame}[c] |
177 \begin{frame}[c] |
136 \frametitle{Applications of ZKPs} |
178 \frametitle{Applications of ZKPs} |
137 |
179 |
138 \begin{itemize} |
180 \begin{itemize} |
139 \item authentication, where one party wants to prove its identity to a |
181 \item authentication, where one party wants to prove its |
140 second party via some secret information, but doesn't want the second |
182 identity to a second party via some secret information, |
141 party to learn anything about this secret\bigskip |
183 but doesn't want the second party to learn anything |
142 \item to enforce honest behaviour while maintaining privacy: the idea is to |
184 about this secret\bigskip |
143 force a user to prove, using a zero-knowledge proof, that its behaviour is |
185 \item to enforce honest behaviour while maintaining privacy: |
144 correct according to the protocol |
186 the idea is to force users to prove, using a |
145 \end{itemize} |
187 zero-knowledge proof, that their behaviour is correct |
146 \end{frame}} |
188 according to the protocol |
|
189 \end{itemize} |
|
190 \end{frame} |
147 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
191 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
148 |
192 |
149 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
193 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
150 \mode<presentation>{ |
194 \mode<presentation>{ |
151 \begin{frame}[c] |
195 \begin{frame}[c] |
219 Why is the GI-protocol zero-knowledge?\bigskip\pause |
263 Why is the GI-protocol zero-knowledge?\bigskip\pause |
220 |
264 |
221 A: We can generate a fake transcript of a conversation, which |
265 A: We can generate a fake transcript of a conversation, which |
222 cannot be distinguished from a ``real'' conversation.\bigskip |
266 cannot be distinguished from a ``real'' conversation.\bigskip |
223 |
267 |
224 Anything Bob can compute using the information obtained from |
268 Anything Bob can compute using the information obtained from |
225 the transcript can be computed using only a forged transcript and |
269 the transcript can be computed using only a forged transcript |
226 therefore participation in such a communication does not increase |
270 and therefore participation in such a communication does not |
227 Bob's capability to perform any computation. |
271 increase Bob's capability to perform any computation. |
228 |
272 |
229 \end{frame}} |
273 \end{frame}} |
230 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
231 |
275 |
232 |
276 |