![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Transparency Overlays and Applications
Transparency Overlays and ApplicationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Andreea Radu. In this talk, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust. We present the abstract concept of a transparency overlay, which can be used in conjunction with any system to give it provable transparency guarantees, and then apply the overlay to two settings: Certificate Transparency and Bitcoin. In the latter setting, we show that the usage of our transparency overlay eliminates the need to engage in mining and allows users to store a single small value rather than the entire blockchain. Our transparency overlay is generically constructed from a signature scheme and a new primitive we call a dynamic list commitment, which in practice can be instantiated using a collision-resistant hash function. This is joint work with Melissa Chase that appeared at CCS 2016 . This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other lists'Roles' Postgraduate Gender and Sexuality Network Discussion http://talks.bham.ac.uk/show/index/1942 SoCS PhD Research Training SessionsOther talksTBA Ultrafast Spectroscopy and Microscopy as probes of Energy Materials TBA Control variates for computing transport coefficients Hunt for an Earth-twin TBA |