YoVDO

Threshold Cryptosystems From Threshold Fully Homomorphic Encryption

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Key Management Courses Fully Homomorphic Encryption Courses

Course Description

Overview

Explore a comprehensive presentation from Crypto 2018 on threshold cryptosystems derived from threshold fully homomorphic encryption. Delve into key concepts including character introduction, key management, threshold cryptography, signatures, and public key encryption. Examine the [GSW13] FHE scheme, noise smudging techniques, and solutions for noise blowup. Compare different schemes, investigate the expressiveness of {0,1}-LSSS, and learn about the universal thresholdizer. Discover practical applications of these techniques and consider open problems in the field of threshold cryptography.

Syllabus

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
Introduction to Characters
Key Management
Threshold Cryptography (t out of n)
Threshold Signatures
Threshold Public Key Encryption
Encryption (TFHE)
Security Definitions
Starting Point: [GSW13] FHE Scheme
Recap: [GSW13]
Smudging with noise
How to Fix Noise Blowup?
How Expressive is {0,1}-LSSS?
Comparison of two schemes
Universal Thresholdizer
Application of Techniques
Open Problems


Taught by

TheIACR

Related Courses

Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
A Cloud Guru
Certified Information Systems Security Professional (CISSP)
A Cloud Guru
CompTIA Security+ Certification Prep
A Cloud Guru
Encryption Fundamentals
A Cloud Guru
LPIC-3 Exam 303: Security
A Cloud Guru