Binary file slides/slides06.pdf has changed
--- a/slides/slides06.tex Mon Nov 03 22:42:47 2014 +0000
+++ b/slides/slides06.tex Tue Nov 04 00:41:34 2014 +0000
@@ -36,10 +36,35 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}[c]
-\frametitle{Problems with Car Keys}
+\frametitle{Problems with Key Fobs}
+
+\begin{columns}
+\begin{column}[T]{4cm}
+\includegraphics[scale=0.4]{../pics/car-standard.jpg}
+\end{column}
+
+\begin{column}[T]{6cm}
+\begin{itemize}
+\item (I learned) jamming the closing
+ signal
+\item relay signals\pause
+\item use diagnostic port to program
+ blank keys
+\end{itemize}
+\end{column}
+\end{columns}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+\frametitle{Hashes for History}
+
+Q: What is the hash for?
\begin{center}
-\includegraphics[scale=0.4]{../pics/car-standard.jpg}
+\includegraphics[scale=0.4]{../pics/Dismantling_Megamos_Crypto.png}
\end{center}
\end{frame}
@@ -86,22 +111,38 @@
\begin{frame}[c]
\frametitle{Zero-Knowledge Proofs}
-Two remarkable properties of \alert{Zero-Knowledge Proofs}:\bigskip
+Two remarkable properties of \alert{Zero-Knowledge
+Proofs}:\bigskip
\begin{itemize}
-\item Alice only reveals the fact that she knows a secret, not the secret itself (meaning
-she can convince Bob that she knows the secret).\bigskip
-\item Having been convinced, Bob cannot use the evidence in order to convince Carol
-that Alice knows the secret.
+
+\item Alice only reveals the fact that she knows a secret, not
+ the secret itself (meaning she can convince Bob that she
+ knows the secret, but does not give it to him).\bigskip
+\item Having been convinced, Bob cannot use the evidence in
+ order to convince Carol that Alice knows the secret.
+
\end{itemize}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
+\begin{frame}[c]
+\frametitle{Interactive Protocols}
+
+Q: How to cut a cake into two equal slices?
+
+\begin{center}
+\includegraphics[scale=0.15]{../pics/cake.jpg}
+\end{center}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}[t]
-\frametitle{\begin{tabular}{@{}c@{}}The Idea \end{tabular}}
+\frametitle{The Idea}
\begin{center}
\begin{tabular}{l@{\hspace{10mm}}r}
@@ -119,31 +160,34 @@
\small
\only<2>{
\begin{textblock}{12}(2,13.3)
-Even if Bob has a hidden camera, a recording will not be convincing to anyone else
-(Alice and Bob could have made it all up).
+Even if Bob has a hidden camera, a recording will not be
+convincing to anyone else (Alice and Bob could have made it
+all up).
\end{textblock}}
\only<3>{
\begin{textblock}{12}(2,13.3)
-Even worse, an observer present at the experiment would not be convinced.
+Even worse, an observer present at the experiment would not be
+convinced.
\end{textblock}}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
\frametitle{Applications of ZKPs}
\begin{itemize}
-\item authentication, where one party wants to prove its identity to a
-second party via some secret information, but doesn't want the second
-party to learn anything about this secret\bigskip
-\item to enforce honest behaviour while maintaining privacy: the idea is to
-force a user to prove, using a zero-knowledge proof, that its behaviour is
-correct according to the protocol
+\item authentication, where one party wants to prove its
+ identity to a second party via some secret information,
+ but doesn't want the second party to learn anything
+ about this secret\bigskip
+\item to enforce honest behaviour while maintaining privacy:
+ the idea is to force users to prove, using a
+ zero-knowledge proof, that their behaviour is correct
+ according to the protocol
\end{itemize}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -221,10 +265,10 @@
A: We can generate a fake transcript of a conversation, which
cannot be distinguished from a ``real'' conversation.\bigskip
-Anything Bob can compute using the information obtained from
-the transcript can be computed using only a forged transcript and
-therefore participation in such a communication does not increase
-Bob's capability to perform any computation.
+Anything Bob can compute using the information obtained from
+the transcript can be computed using only a forged transcript
+and therefore participation in such a communication does not
+increase Bob's capability to perform any computation.
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%