{
"id": "4592",
"isDefault": "1",
"learnMode": "freeMode",
"isMember": "",
"status": "published"
}
{
"i18nChapterName": "Chapter",
"i18nUnitName": "Part",
"i18nTaskName":"Task"
}
[{"itemType":"chapter","number":"1","title":"Introduction to Cryptography and Zero-Knowledge Proofs","result":"","resultStatus":"","lock":"","status":"published","taskId":"1739","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"1-1","title":"Definition and Importance of Cryptography","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1397","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"1-2","title":"456","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1427","isOptional":"0","type":"exercise","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"1-3","title":"123","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1428","isOptional":"0","type":"testpaper","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"2","title":"Basics of Zero-Knowledge Proofs","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1398","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"3","title":"Interactive Proof Systems","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1399","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"2","title":"Understanding the MinRank Problem","result":"","resultStatus":"","lock":"","status":"published","taskId":"1743","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"4","title":"Mathematical Foundations of the MinRank Problem","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1400","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"5","title":"Applications of MinRank in Cryptography","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1401","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"6","title":"NP-Completeness of MinRank","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1402","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"3","title":"The MRZK Protocol","result":"","resultStatus":"","lock":"","status":"published","taskId":"1747","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"7","title":"Structure and Functionality of MRZK","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1403","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"8","title":"Security Properties of MRZK","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1404","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"9","title":"Soundness Error Analysis","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1405","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"4","title":"Enhancements with MRZK\u2020","result":"","resultStatus":"","lock":"","status":"published","taskId":"1751","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"10","title":"Improvements Over MRZK","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1406","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"11","title":"Efficiency and Proof Size Reduction","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1407","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"12","title":"Challenges in MRZK\u2020","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1408","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"5","title":"Introducing MRZK\u266f Protocol","result":"","resultStatus":"","lock":"","status":"published","taskId":"1755","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"13","title":"Transition from MRZK\u2020 to MRZK\u266f","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1409","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"14","title":"Construction of MRZK\u266f","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1410","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"15","title":"Utility of Sigma Protocols","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1411","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"6","title":"Optimization Techniques in ZKPoK","result":"","resultStatus":"","lock":"","status":"published","taskId":"1759","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"16","title":"Reducing Soundness Error","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1412","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"17","title":"Commitment Schemes and Their Efficiency","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1413","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"18","title":"Use of Merkle Trees in Protocols","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1414","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"7","title":"Post-Quantum Cryptography","result":"","resultStatus":"","lock":"","status":"published","taskId":"1763","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"19","title":"Introduction to Post-Quantum Cryptography","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1415","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"20","title":"ZKPoK in Post-Quantum Context","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1416","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"21","title":"Security Concerns and Future Directions","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1417","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"8","title":"Performance Evaluation of ZKPoK Protocols","result":"","resultStatus":"","lock":"","status":"published","taskId":"1767","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"22","title":"Comparative Analysis of Protocols","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1418","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"23","title":"Benchmarking Protocol Efficiency","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1419","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"24","title":"Case Studies on Implementation","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1420","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"9","title":"Advanced Topics in Zero-Knowledge Proofs","result":"","resultStatus":"","lock":"","status":"published","taskId":"1771","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"25","title":"Exploring New Protocols and Techniques","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1421","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"26","title":"Algebraic Attacks on ZKPoK","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1422","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"27","title":"Future of ZKPoK Research","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1423","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"chapter","number":"10","title":"Final Project Work Session","result":"","resultStatus":"","lock":"","status":"published","taskId":"1775","isOptional":"0","type":"chapter","isTaskFree":"","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":""},{"itemType":"task","number":"28","title":"Project Planning and Research","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1424","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"29","title":"Prototype Development","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1425","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0},{"itemType":"task","number":"30","title":"Peer Review and Feedback","result":"","resultStatus":"","lock":false,"status":"published","taskId":"1426","isOptional":"0","type":"text","isTaskFree":"0","watchLimitRemaining":false,"replayStatus":"","activityStartTimeStr":"","activityStartTime":"","activityLength":"","activityEndTime":"","fileStorage":"","isTaskTryLookable":0}]
{
"text": {
"icon": "es-icon es-icon-graphicclass",
"name": "Text"
}
,
"video": {
"icon": "es-icon es-icon-videoclass",
"name": "Video"
}
,
"audio": {
"icon": "es-icon es-icon-audioclass",
"name": "Audio"
}
,
"live": {
"icon": "es-icon es-icon-videocam",
"name": "Live"
}
,
"discuss": {
"icon": "es-icon es-icon-comment",
"name": "Discuss"
}
,
"flash": {
"icon": "es-icon es-icon-flashclass",
"name": "Flash"
}
,
"doc": {
"icon": "es-icon es-icon-description",
"name": "Document"
}
,
"ppt": {
"icon": "es-icon es-icon-pptclass",
"name": "PPT"
}
,
"testpaper": {
"icon": "es-icon es-icon-kaoshi",
"name": "Testpaper"
}
,
"homework": {
"icon": "es-icon es-icon-zuoye",
"name": "Homework"
}
,
"exercise": {
"icon": "es-icon es-icon-mylibrarybooks",
"name": "Exercise"
}
,
"download": {
"icon": "es-icon es-icon-filedownload",
"name": "Download"
}
,
"lticonsumer": {
"icon": "es-icon es-icon-graphicclass",
"name": "Lti"
}
}
1744296601