Verifiable Functional Encryption
Offered By: TheIACR via YouTube
Course Description
Overview
Explore functional encryption in this 24-minute conference talk from Asiacrypt 2016. Delve into classical encryption concepts before examining functional encryption (FE) and IND security. Learn about auditing applications and their drawbacks. Analyze various attempts at implementing functional encryption, including trivial and first attempts. Investigate message hiding techniques and verifiability challenges. Discover innovative ideas for maintaining message privacy while addressing verifiability issues. Gain insights into advanced cryptographic concepts and their practical implications for secure data access and auditing.
Syllabus
Intro
Classical Encryption
Functional Encryption (FE)
IND Security
Example: Audits (GPSW'06)
Drawback?
Trivial Attempt
First Attempt
Message Hiding
Next Attempt
What about Verifiability?
Idea 1
Message privacy holds!
Verifiability lost!
Another Lock
Taught by
TheIACR
Related Courses
EncryptionTheIACR via YouTube Welcome - Functional Encryption and Identity Based Encryption
TheIACR via YouTube A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
TheIACR via YouTube Combiners for Functional Encryption, Unconditionally
TheIACR via YouTube A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Association for Computing Machinery (ACM) via YouTube