YoVDO

Another Look at Provable Security

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Provable Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical examination of provable security in cryptography through this Eurocrypt 2012 conference talk by Alfred Menezes. Delve into the complexities of non-tight reductions, focusing on the classic Bellare-Rogaway proof for RSA-FDH in the random oracle model. Examine identity-based encryption schemes and investigate the importance of tightness in security proofs. Analyze MACs in multi-user settings, comparing single-user and multi-user scenarios. Evaluate Bellare's security theorem for NMAC and interpret its practical implications. Consider the PRF security model and its assumptions. Discuss the significance of non-uniform complexity models in cryptographic proofs. Reflect on the COPS (Cryptanalysis of Provable Security) approach and contemplate a radical proposal for the field. Gain valuable insights into the challenges and future directions of provable security in modern cryptography.

Syllabus

Intro
What this talk is about
Example of a non-tight reduction The classic Bellare-Rogaway proof for RSA-FDH in the random oracle model has a tightness gap of y, where is the number of hash function queries
Identity-based encryption schemes
Does tightness matter?
MACs in the multi-user setting
Security proof for MAC* The proof is a reduction from breaking MAC1 to breaking MAC
Provably secure, but insecure
MAC* in other protocols
Single-user vs. multi-user
Bellare's security theorem for NMAC
PRF security Security assumption: f is (t,c,q)-secure. That is, adversaries
PRF security in the non-uniform model
Interpreting Bellare's proof in practice
Is HMAC-MD5 provably secure?
Non-uniform complexity model
Significance of our work
COPS: Cryptanalysis of Provable Security
A radical proposal
In conclusion....


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube