Identity-Based Encryption Resilient to Continual Auxiliary Inputs
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.
Syllabus
Intro
Outline
Side-Channel Attack
Restrictions of Leakage
Bounded Retrieval Model
IBE with Auxiliary Inputs
Problem Statement
Our Contributions (1)
Goldreich-Levin Theorem
Modified GL Theorem
Aux-PKE - Aux-IBE
Our Auxiliary Input Model
Roadmap of Our Construction
Intuitions of Our Schemes
Our Contributions (4)
Extensions
Leakage during Setup
Summary of Contributions
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera