Text Search Protocols with Simulation Based Security
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a talk from PKC 2010 on Text Search Protocols with Simulation Based Security, presented by authors Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen. Delve into the intricacies of automata encryption, select and evaluation techniques, and the KNP approach. Discover applications, previous research, and a simplified protocol explanation using real-world examples like militia scenarios. Gain insights into security requirements, motivations behind the research, and the fundamental concepts of automata in cryptography. Conclude with a comprehensive understanding of text search protocols and their implications for secure information retrieval.
Syllabus
Introduction
Applications
Papers
Previous Talk
Overview
Simpler Protocol
Simpler Example
Militia Example
What is an Automata
Security Requirements
Motivations
KNP Techniques
Automata
Automata Encryption
Select
Evaluation
Conclusion
Taught by
TheIACR
Related Courses
Automata TheoryStanford University via edX 理论计算机科学基础 | Introduction to Theoretical Computer Science
Peking University via edX 离散数学概论 Discrete Mathematics Generality
Peking University via Coursera System Validation: Automata and behavioural equivalences
EIT Digital via Coursera System Validation (3): Requirements by modal formulas
EIT Digital via Coursera