decentralized-id.github.io/unsorted/cryptography.md
2023-07-03 03:47:34 +05:30

13 lines
1.9 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Cryptography
* [The Use of Self-Sovereign Identity With Zero-Knowledge Proof (ZKP)](https://medium.datadriveninvestor.com/self-sovereign-identity-with-zero-knowledge-proof-9a05f36f16da) Data Driven Investor
* [Part 5: How Zero-Knowledge Proofs (ZKPs) Enable Smarter Customer Insights, With Less Liability](https://www.evernym.com/blog/zero-knowledge-proofs/)
> Put simply, most organizations are unthinkingly collecting more data from customers, without understanding the true impact: the real costs to themselves, and to customers.
* [Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare](https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs) 2017-08-14 Clare Nelson
> In the near future, privacy-preserving authentication methods will flood the market, and they will be based on Zero-Knowledge Proofs. IBM and Microsoft invested in these solutions many years ago.
* [How to Explain Public-Key Cryptography and Digital Signatures to Anyone](https://auth0.com/blog/how-to-explain-public-key-cryptography-digital-signatures-to-anyone/)
> Heres an easy-to-understand analogy to help your non-technical friends and customers understand public keys and private keys, and how they relate to cryptography and digital signatures.
* [Zero Knowledge Proofs](https://www.windley.com/archives/2021/11/zero_knowledge_proofs.shtml) 2021-11 Phil Windley
> This problem was first explored by MIT researchers Shafi Goldwasser, Silvio Micali and Charles Rackoff in the 1980s as a way of combatting information leakage. The goal is to reduce the amount of extra information the verifier, Victor, can learn about the prover, Peggy.
* [@BartHanssens shares](https://twitter.com/BartHanssens/status/1319604882068787200):
> proofs: https://w3c-ccg.github.io/ld-proofs, cryptosuite: https://w3c-ccg.github.io/ld-cryptosuite-registry, #GnuPG: signatures https://gpg.jsld.org/contexts