COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Applications of proofs to network security
Applications of proofs to network securityAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Hridoy Sankar Dutta. Blockchains have motivated a surge of research and development into succinct probabilistic proofs. As proof constructions have gotten dramatically more efficient, entirely new applications have become feasible in other areas as well. This talk will discuss two proposed applications in the area of network security. First, zero-knowledge middleboxes (ZKMBs), which enable network users to prove that their packets comply with a network usage policy (e.g. a domain blocklist) without revealing their actual data to the middlebox. Second, replacing certificate authorities (CAs) with proofs in a new protocol called DOVE , removing the massive trust placed in the current CA ecosystem. https://cam-ac-uk.zoom.us/j/82992103686?pwd=bys5cVNzQjNKdlI1SHUyMWZFeWlSZz09 Meeting ID: 829 9210 3686 Passcode: 357389 This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsChemistry CUJS Queens' PoliticsOther talksContributed talk - TBC Title - tbc Infrastructural Fear: or When Climate Change Isn’t an Allegory When the data cannot speak clearly: Covid-19 and minoritised groups The Evolution of Locomotion Through the Development Lens: Insights into the Morphology of the Human Talus and Calcaneus How to Vaccinate the Masses? Safety, compulsion, and the success of vaccination policy in nineteenth-century Britain |