University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Applications of proofs to network security

Applications of proofs to network security

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Hridoy Sankar Dutta.

Blockchains have motivated a surge of research and development into succinct probabilistic proofs. As proof constructions have gotten dramatically more efficient, entirely new applications have become feasible in other areas as well. This talk will discuss two proposed applications in the area of network security. First, zero-knowledge middleboxes (ZKMBs), which enable network users to prove that their packets comply with a network usage policy (e.g. a domain blocklist) without revealing their actual data to the middlebox. Second, replacing certificate authorities (CAs) with proofs in a new protocol called DOVE , removing the massive trust placed in the current CA ecosystem.

https://cam-ac-uk.zoom.us/j/82992103686?pwd=bys5cVNzQjNKdlI1SHUyMWZFeWlSZz09

Meeting ID: 829 9210 3686 Passcode: 357389

This talk is part of the Computer Laboratory Security Seminar series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity