YoVDO

Text Search Protocols with Simulation Based Security

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Automata Theory Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a talk from PKC 2010 on Text Search Protocols with Simulation Based Security, presented by authors Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen. Delve into the intricacies of automata encryption, select and evaluation techniques, and the KNP approach. Discover applications, previous research, and a simplified protocol explanation using real-world examples like militia scenarios. Gain insights into security requirements, motivations behind the research, and the fundamental concepts of automata in cryptography. Conclude with a comprehensive understanding of text search protocols and their implications for secure information retrieval.

Syllabus

Introduction
Applications
Papers
Previous Talk
Overview
Simpler Protocol
Simpler Example
Militia Example
What is an Automata
Security Requirements
Motivations
KNP Techniques
Automata
Automata Encryption
Select
Evaluation
Conclusion


Taught by

TheIACR

Related Courses

Automata Theory
Stanford University via edX
理论计算机科学基础 | Introduction to Theoretical Computer Science
Peking University via edX
离散数学概论 Discrete Mathematics Generality
Peking University via Coursera
System Validation: Automata and behavioural equivalences
EIT Digital via Coursera
System Validation (3): Requirements by modal formulas
EIT Digital via Coursera