|     34 \end{frame} |     34 \end{frame} | 
|     35 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%      |     35 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%      | 
|     36  |     36  | 
|     37 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |     37 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|     38 \begin{frame}[c] |     38 \begin{frame}[c] | 
|     39 \frametitle{Problems with Car Keys} |     39 \frametitle{Problems with Key Fobs} | 
|     40  |     40  | 
|     41 \begin{center} |     41 \begin{columns} | 
|         |     42 \begin{column}[T]{4cm} | 
|     42 \includegraphics[scale=0.4]{../pics/car-standard.jpg} |     43 \includegraphics[scale=0.4]{../pics/car-standard.jpg} | 
|         |     44 \end{column} | 
|         |     45  | 
|         |     46 \begin{column}[T]{6cm}  | 
|         |     47 \begin{itemize} | 
|         |     48 \item (I learned) jamming the closing  | 
|         |     49   signal | 
|         |     50 \item relay signals\pause | 
|         |     51 \item use diagnostic port to program  | 
|         |     52   blank keys  | 
|         |     53 \end{itemize} | 
|         |     54 \end{column} | 
|         |     55 \end{columns} | 
|         |     56  | 
|         |     57 \end{frame} | 
|         |     58 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    | 
|         |     59  | 
|         |     60 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|         |     61 \begin{frame}[c] | 
|         |     62 \frametitle{Hashes for History} | 
|         |     63  | 
|         |     64 Q: What is the hash for? | 
|         |     65  | 
|         |     66 \begin{center} | 
|         |     67 \includegraphics[scale=0.4]{../pics/Dismantling_Megamos_Crypto.png} | 
|     43 \end{center} |     68 \end{center} | 
|     44  |     69  | 
|     45 \end{frame} |     70 \end{frame} | 
|     46 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    |     71 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    | 
|     47  |     72  | 
|     84  |    109  | 
|     85 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |    110 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|     86 \begin{frame}[c] |    111 \begin{frame}[c] | 
|     87 \frametitle{Zero-Knowledge Proofs} |    112 \frametitle{Zero-Knowledge Proofs} | 
|     88  |    113  | 
|     89 Two remarkable properties of \alert{Zero-Knowledge Proofs}:\bigskip |    114 Two remarkable properties of \alert{Zero-Knowledge  | 
|     90  |    115 Proofs}:\bigskip | 
|     91 \begin{itemize} |    116  | 
|     92 \item Alice only reveals the fact that she knows a secret, not the secret itself (meaning  |    117 \begin{itemize} | 
|     93 she can convince Bob that she knows the secret).\bigskip |    118  | 
|     94 \item Having been convinced, Bob cannot use the evidence in order to convince Carol  |    119 \item Alice only reveals the fact that she knows a secret, not | 
|     95 that Alice knows the secret. |    120       the secret itself (meaning she can convince Bob that she | 
|     96 \end{itemize} |    121       knows the secret, but does not give it to him).\bigskip | 
|     97  |    122 \item Having been convinced, Bob cannot use the evidence in | 
|     98 \end{frame} |    123       order to convince Carol that Alice knows the secret. | 
|     99 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    |    124  | 
|    100  |    125 \end{itemize} | 
|    101 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |    126  | 
|    102 \mode<presentation>{ |    127 \end{frame} | 
|         |    128 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    | 
|         |    129  | 
|         |    130 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|         |    131 \begin{frame}[c] | 
|         |    132 \frametitle{Interactive Protocols} | 
|         |    133  | 
|         |    134 Q: How to cut a cake into two equal slices? | 
|         |    135  | 
|         |    136 \begin{center} | 
|         |    137 \includegraphics[scale=0.15]{../pics/cake.jpg} | 
|         |    138 \end{center} | 
|         |    139  | 
|         |    140 \end{frame} | 
|         |    141 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    | 
|         |    142  | 
|         |    143 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|    103 \begin{frame}[t] |    144 \begin{frame}[t] | 
|    104 \frametitle{\begin{tabular}{@{}c@{}}The Idea \end{tabular}} |    145 \frametitle{The Idea} | 
|    105  |    146  | 
|    106 \begin{center} |    147 \begin{center} | 
|    107 \begin{tabular}{l@{\hspace{10mm}}r} |    148 \begin{tabular}{l@{\hspace{10mm}}r} | 
|    108 \\[-10mm] |    149 \\[-10mm] | 
|    109 \raisebox{10mm}{\large 1.} & \includegraphics[scale=0.1]{../pics/alibaba1.png}\\ |    150 \raisebox{10mm}{\large 1.} & \includegraphics[scale=0.1]{../pics/alibaba1.png}\\ | 
|    117 \end{textblock} |    158 \end{textblock} | 
|    118  |    159  | 
|    119 \small |    160 \small | 
|    120 \only<2>{ |    161 \only<2>{ | 
|    121 \begin{textblock}{12}(2,13.3) |    162 \begin{textblock}{12}(2,13.3) | 
|    122 Even if Bob has a hidden camera, a recording will not be convincing to anyone else  |    163 Even if Bob has a hidden camera, a recording will not be | 
|    123 (Alice and Bob could have made it all up). |    164 convincing to anyone else (Alice and Bob could have made it | 
|         |    165 all up). | 
|    124 \end{textblock}} |    166 \end{textblock}} | 
|    125 \only<3>{ |    167 \only<3>{ | 
|    126 \begin{textblock}{12}(2,13.3) |    168 \begin{textblock}{12}(2,13.3) | 
|    127 Even worse, an observer present at the experiment would not be convinced. |    169 Even worse, an observer present at the experiment would not be | 
|         |    170 convinced. | 
|    128 \end{textblock}} |    171 \end{textblock}} | 
|    129  |    172  | 
|    130 \end{frame}} |    173 \end{frame} | 
|    131 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    |    174 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%    | 
|    132  |    175  | 
|    133 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |    176 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|    134 \mode<presentation>{ |         | 
|    135 \begin{frame}[c] |    177 \begin{frame}[c] | 
|    136 \frametitle{Applications of ZKPs} |    178 \frametitle{Applications of ZKPs} | 
|    137  |    179  | 
|    138 \begin{itemize} |    180 \begin{itemize} | 
|    139 \item authentication, where one party wants to prove its identity to a  |    181 \item authentication, where one party wants to prove its | 
|    140 second party via some secret information,  but doesn't want the second  |    182       identity to a second party via some secret information, | 
|    141 party to learn anything about this secret\bigskip |    183       but doesn't want the second party to learn anything | 
|    142 \item to enforce honest behaviour while maintaining privacy: the idea is to  |    184       about this secret\bigskip | 
|    143 force a user to prove, using a zero-knowledge proof, that its behaviour is  |    185 \item to enforce honest behaviour while maintaining privacy: | 
|    144 correct according to the protocol |    186       the idea is to force users to prove, using a | 
|    145 \end{itemize} |    187       zero-knowledge proof, that their behaviour is correct | 
|    146 \end{frame}} |    188       according to the protocol | 
|         |    189 \end{itemize} | 
|         |    190 \end{frame} | 
|    147 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  |    191 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  | 
|    148  |    192  | 
|    149 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |    193 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | 
|    150 \mode<presentation>{ |    194 \mode<presentation>{ | 
|    151 \begin{frame}[c] |    195 \begin{frame}[c] | 
|    219 Why is the GI-protocol zero-knowledge?\bigskip\pause |    263 Why is the GI-protocol zero-knowledge?\bigskip\pause | 
|    220  |    264  | 
|    221 A: We can generate a fake transcript of a conversation, which  |    265 A: We can generate a fake transcript of a conversation, which  | 
|    222 cannot be distinguished from a ``real'' conversation.\bigskip |    266 cannot be distinguished from a ``real'' conversation.\bigskip | 
|    223  |    267  | 
|    224 Anything Bob can compute using the information obtained from  |    268 Anything Bob can compute using the information obtained from | 
|    225 the transcript can be computed using only a forged transcript and  |    269 the transcript can be computed using only a forged transcript | 
|    226 therefore participation in such a communication does not increase  |    270 and therefore participation in such a communication does not | 
|    227 Bob's capability  to perform any computation. |    271 increase Bob's capability to perform any computation. | 
|    228  |    272  | 
|    229 \end{frame}} |    273 \end{frame}} | 
|    230 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     |    274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     | 
|    231     |    275     | 
|    232     |    276     |