YoVDO

Verifiable Inner Product Encryption Scheme

Offered By: TheIACR via YouTube

Tags

Cryptography Courses

Course Description

Overview

Learn about a novel cryptographic scheme in this 21-minute conference talk from PKC 2020. Explore the Verifiable Inner Product Encryption Scheme, presented by researchers Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, and Peter Y. A. Ryan. Delve into the construction of the scheme, including its encryption algorithm, and understand its applications in cryptography. Examine the conflicting requirements and how they are addressed, as well as the results of the research. Gain insights into verifiable functional encryption and its importance in modern cryptographic systems.

Syllabus

Introduction
Outline
Example
Verifiable Fe
Conflicting Requirements
Product Encryption Scheme
Constructing LPD
Encryption Algorithm
Results
Application
Verification


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera