Verifiable Inner Product Encryption Scheme
Offered By: TheIACR via YouTube
Course Description
Overview
Learn about a novel cryptographic scheme in this 21-minute conference talk from PKC 2020. Explore the Verifiable Inner Product Encryption Scheme, presented by researchers Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, and Peter Y. A. Ryan. Delve into the construction of the scheme, including its encryption algorithm, and understand its applications in cryptography. Examine the conflicting requirements and how they are addressed, as well as the results of the research. Gain insights into verifiable functional encryption and its importance in modern cryptographic systems.
Syllabus
Introduction
Outline
Example
Verifiable Fe
Conflicting Requirements
Product Encryption Scheme
Constructing LPD
Encryption Algorithm
Results
Application
Verification
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera