У нас вы можете посмотреть бесплатно ZK Whiteboard Sessions - S3M7: zkID (Anonymous Credentials), w/ Ying Tong или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
ZK Whiteboard Sessions - S3M7: zkID (Anonymous Credentials), w/ Ying Tong For all additional info and resources watch it here: https://zkhack.dev/whiteboard/s3m7/ Full ZK Whiteboard Sessions - Season 1 playlist here: • ZK Whiteboard Sessions - S1 Full ZK Whiteboard Sessions - Season 2 playlist here: • ZK Whiteboard Sessions - S2 Full ZK Whiteboard Sessions - Season 3 playlist here: • ZK Whiteboard Sessions - S3 In this module, Nicolas Mohnblatt and Ying Tong explain the critical need for privacy-preserving digital ID systems using zk-SNARKs. She first covers existing systems, but shows how the methods used are flawed. These existing systems may inadvertently expose linkability and observability, allowing issuers and verifiers to track users across different presentations. The proposed solution, zkID, is a zk-SNARK architecture, which acts as a privacy layer over existing credentials. This method conceals the static signature and data, enabling private, unlinkable presentations to be verified without requiring issuers to change the cryptography underlying their systems. The discussion also covers advanced topics like credential revocation, deniable presentation, the out-of-protocol risks of de-anonymization, and the technical trade-offs between different ZK proof systems and the importance of standardization in the road to wide-scale adoption. What you’ll learn: 00:00 Introduction and Session Outline 05:44 Current Digital ID Designs: LA Wallet example 12:02 Formally Stating the Privacy Invariant: The Unlinkability Problem 17:13 Adding Privacy Without Modifying Issuer Behavior: The zkID Solution 19:34 zkSNARK of a Signature System 27:31 Generalizing the ZKID Architecture 33:29 Credential Revocation Methods 42:02 Deniable Presentation / Plausible Deniability / Repudiation 50:29 The Risk of De-anonymization Through Data Correlation 53:24 Choosing a ZK Proof System: Trade-offs in Google’s vs. Microsoft’s design 1:03:01 The Importance of Standardization 1:07:33 Summary and Conclusion If you like what we do: Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) Follow us on Twitter @zeroknowledgefm ( / zeroknowledgefm ) Join us on Telegram (https://zeroknowledge.fm/telegram) Catch us on YouTube (https://zeroknowledge.fm/)