YoVDO

Identity-Based Encryption Resilient to Continual Auxiliary Inputs

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Side Channel Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.

Syllabus

Intro
Outline
Side-Channel Attack
Restrictions of Leakage
Bounded Retrieval Model
IBE with Auxiliary Inputs
Problem Statement
Our Contributions (1)
Goldreich-Levin Theorem
Modified GL Theorem
Aux-PKE - Aux-IBE
Our Auxiliary Input Model
Roadmap of Our Construction
Intuitions of Our Schemes
Our Contributions (4)
Extensions
Leakage during Setup
Summary of Contributions


Taught by

TheIACR

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX
Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX
Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX