YoVDO

2021 ITC Conference - Doubly-Affine Extractors, and Their Applications

Offered By: Paul G. Allen School via YouTube

Tags

Cryptography Courses Privacy Courses

Course Description

Overview

Explore the concept of doubly-affine extractors and their applications in information-theoretic privacy during this 30-minute conference talk from the 2021 ITC Conference. Delve into the misconception that information-theoretic privacy is impractical for real-world use, and discover how to build simple, reusable IT-encryption solutions with minimal efficiency penalties. Learn about stateless and locally computable encryption methods that operate at optimal rates, allowing honest parties to read only small portions of large keys. Examine a novel architecture for outsourcing large key storage to semi-trusted servers, addressing issues of everlasting privacy and post-application security. Gain insights into the nearly optimal constructions of doubly-affine extractors, their linear functions, and protection against bounded affine leakage. Understand how these concepts apply to various topics including stateless encryption, security reductions, and W5 extractors.

Syllabus

Introduction
Information Theoretical Encryption
Stateless Encryption
DoublyAffine Extractor
Security
PostApplication Leakage
Computational Secure Seeds
Suboptimal Rates
W5 Extractors
Security Reductions
Constructions


Taught by

Paul G. Allen School

Related Courses

Neuroethics
University of Pennsylvania via Coursera
Fundamentals of Online Education: Planning and Application
Georgia Institute of Technology via Coursera
Understanding Media by Understanding Google
Northwestern University via Coursera
Wiretaps to Big Data: Privacy and Surveillance in the Age of Interconnection
Cornell University via edX
Internet, les autres et moi
Certificat informatique et internet via France Université Numerique