devcon 7 / cls programmable cryptography
Duration: 01:37:35
Speaker: Albert Ni, Barry, gubsheep, Justin Glibert, Vitalik Buterin
Type: Mixed Formats
Expertise:
Event: Devcon
Date: Nov 2024
Programmable Cryptography and Ethereum, Panel
One of the core themes of this panel is how Programmable Cryptography synergizes with Ethereum. Panelists will discuss questions such as ''Why have we not been able to do everything we've wanted with Ethereum?'' and ''Why have certain kinds of applications - from decentralized social to decentralized games to decentralized finance - not been able to reach their full potential with only consensus technology?''
What to know about Zero Knowledge
Zero Knowledge, aka ZK, has become a catch-all term to represent much of "modern" or "advanced" cryptography -- especially cryptography that's relevant to the future of blockchains. In this panel, we will share our perspectives on ZK -- how to think about it, what to look out for, and what to focus in on. We'll also discuss how ZK may alter and complement Ethereum's own future.
Keynote: Programmable Cryptography and Ethereum
Programmable Cryptography is a "second generation" of cryptographic primitives - primitives that allow arbitrary programs to be executed "inside of" or "on top of" cryptographic objects. Programmable cryptography provides three key affordances that complement and amplify the affordances of Ethereum--verifiability, confidentiality, and non-interactivity. We'll discuss how these technologies can reshape the Internet over the next 50 years.
Keynote: The Universal Cryptographic Adapter
The "secret" third affordance of Zero-Knowledge proof after 1) Privacy and 2) Succinctness is Interoperability. ZK enables us to continuously refactor data, aggregate it from different sources, and transforming it without loosing its integrity. Starting with the Zupass project, and now with the broader adoption of the POD and GPC format, 0xPARC has been exploring using ZK for data sovereignty and creating more interoperable data ecosystem. We will cover our learnings and progress in this talk.
Closing Ceremonies: Devcon Decade 0
In the closing panel of Devcon 7 SEA, Nicholas Paul from The Long Now Foundation, Aya Miyaguchi, Executive Director of the Ethereum Foundation, and Justin Glibert and Gubsheep (Brian Gu) from 0xPARC discussed the philosophy of “subtraction” in organizational design, emphasizing how creating space by letting go fosters innovation and long-term thinking, the interplay between technology and culture within Ethereum.
Indistinguishability Obfuscation (iO)
There has been a lot of recent progress and interest in iO (Indistinguishability Obfuscation). This session will cover topics from the basics to theory and attempts at practical implementations—plus ways of breaking these attempts.
Multi-Party Fully Homomorphic Encryption (MP-FHE) in Practice
In this session, we will break down the FHE game Frogzone, which required advancements at every layer of the cryptographic software stack: cryptography libraries and tooling, circuits, software infrastructure, and even DevOps. We will also cover additional use cases for FHE at a technical level.
Programmable Cryptography from a Software Engineering Lens
Different cryptographic primitives have different affordances, especially when using them in practice, and especially together. In this session, we explore a new way of interacting with PCs at a software engineering level via a LISP like programming language. This language enables creating self-verifying graphs of computation.
Keynote: Ethereum in 30 minutes
Vitalik Buterin, Founder of Ethereum, opens Devcon with a comprehensive overview of Ethereum’s evolution as a decentralized “world computer,” explaining its layer 1 trust machine and layer 2 scaling solutions for security and scalability, emphasizing improvements in decentralization and client diversity, and encouraging developers to build innovative applications that leverage Ethereum’s robust and evolving ecosystem.
Programmable Cryptography and the future of the Internet
You rarely hear of issues at the networking layer of the Internet: networking companies are running utilities business: they are fungible and can be swapped if distrusted. Most of the value captured on the Internet -- and also most abuse -- happen at the Compute and Data layer of the Web. Ethereum gave us a glimpse of a fundamentally different architecture for Compute and Data than Client/Server architecture.We think the Internet is 1/3 complete, and that programmable cryptography can finish it.