Identity-Based Encryption Resilient to Continual Auxiliary Inputs
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.
Syllabus
Intro
Outline
Side-Channel Attack
Restrictions of Leakage
Bounded Retrieval Model
IBE with Auxiliary Inputs
Problem Statement
Our Contributions (1)
Goldreich-Levin Theorem
Modified GL Theorem
Aux-PKE - Aux-IBE
Our Auxiliary Input Model
Roadmap of Our Construction
Intuitions of Our Schemes
Our Contributions (4)
Extensions
Leakage during Setup
Summary of Contributions
Taught by
TheIACR
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Cryptography and Information Theory
University of Colorado System via Coursera Introduction to Software Side Channels and Mitigations
Graz University of Technology via edX Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX Physical and Advanced Side-Channel Attacks
Graz University of Technology via edX