Advanced Encryption Techniques and Applications - Session
Offered By: TheIACR via YouTube
Course Description
Overview
Dive into a comprehensive 1-hour session on advanced encryption techniques, exploring timelock applications, BLS Group G2 signatures, and post-quantum cryptography. Learn about centralized access control, attribute-based encryption schemes, and the challenges faced in traditional public key cryptography. Discover new constructions and standardization efforts in encryption, including multi-recipient integrity, key commitment, and context commitment. Gain insights into unintended behaviors and potential solutions in modern cryptographic systems. Conclude with a discussion on the future of encryption and its implications for security and privacy.
Syllabus
Introduction
Timelock Applications
BLS
Group G2 signatures
Advanced Encryption
Go
Whats next
PQB
Demo
Centralized Access Control
Traditional Public Key Cryptography
AttributeBased Encryption
Scheme
Encryption
Challenges
Features
Conclusion
Multirecipient Integrity
Unintended Behavior
Key Commitment
Context Commitment
Standardizing
New Construction
Do you need context commitment
Taught by
TheIACR
Related Courses
Cryptography for Quantum ComputersSimons Institute via YouTube Attribute Based and Fully Homomorphic Encryption
TheIACR via YouTube Encryption++
TheIACR via YouTube Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
TheIACR via YouTube Welcome - Functional Encryption and Identity Based Encryption
TheIACR via YouTube