![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Transparency Overlays and Applications
Transparency Overlays and ApplicationsAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Andreea Radu. In this talk, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust. We present the abstract concept of a transparency overlay, which can be used in conjunction with any system to give it provable transparency guarantees, and then apply the overlay to two settings: Certificate Transparency and Bitcoin. In the latter setting, we show that the usage of our transparency overlay eliminates the need to engage in mining and allows users to store a single small value rather than the entire blockchain. Our transparency overlay is generically constructed from a signature scheme and a new primitive we call a dynamic list commitment, which in practice can be instantiated using a collision-resistant hash function. This is joint work with Melissa Chase that appeared at CCS 2016 . This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsMolecular and Medical Physics Seminar Series IMA West Midlands Branch Algebra Reading Group on Sporadic GroupsOther talksQuantum simulations using ultra cold ytterbium Geometry of alternating projections in metric spaces with bounded curvature Perfect matchings in random sparsifications of Dirac hypergraphs Provably Convergent Plug-and-Play Quasi-Newton Methods for Imaging Inverse Problems The development of an optically pumped magnetometer based MEG system Hodge Theory: Connecting Algebra and Analysis |