YoVDO

Lower Bounds on Obfuscation from All or Nothing Encryption

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Encryption Courses Decryption Courses Obfuscation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2017 on lower bounds for obfuscation derived from all-or-nothing encryption. Delve into the paper by Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed as they discuss key assumptions for indistinguishability obfuscation, the nature of all-or-nothing constructs, and blackbox implementations. Examine high-level concepts, the definition of idealized oracles and decryption processes, and the role of hidden queries in this cryptographic research. Gain insights into cutting-edge obfuscation techniques and their theoretical foundations in this 21-minute talk that covers introduction, assumptions, constructions, and a comprehensive summary of findings.

Syllabus

Introduction
What assumptions could give us IO
Allornothing nature
Blackbox construction
Highlevel ideas
Defining idealized Oracle
Defining decryption
Hidden Queries
Summary


Taught by

TheIACR

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera