YoVDO

Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Encryption Algorithms Courses Functional Encryption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive presentation on functional encryption, focusing on the transition from deterministic to randomized functions based on simple assumptions. Delve into key concepts including functional encryption algorithms, proxy and audit examples, and the intricacies of randomized functional encryption. Examine correctness definitions, bad randomness scenarios, and a generic transformation process. Learn about key generation algorithms, hiding properties, and encryption techniques. Conclude with a summary of findings and explore open questions in this cutting-edge field of cryptography.

Syllabus

Introduction
Functional Encryption
Functional Encryption Algorithms
Example 1 Proxy
Example 2 Audit
Randomized Functional Encryption
Results
correctness definition
bad randomness
example
generic transformation
key generation algorithm
hiding properties
encryption
encryption algorithm
summary
open questions


Taught by

TheIACR

Related Courses

أساسيات التشفير
Rwaq (رواق)
IT Security: Defense against the digital dark arts
Google via Coursera
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
Cresça com o Google via Coursera
Seguridad informática: defensa contra las artes oscuras digitales
Crece con Google via Coursera
Information Systems Asset Protection: Asset Security
Pluralsight