From Laconic Zero Knowledge to Public Key Cryptography

From Laconic Zero Knowledge to Public Key Cryptography

TheIACR via YouTube Direct link

Weak Key Agreement

12 of 14

12 of 14

Weak Key Agreement

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

From Laconic Zero Knowledge to Public Key Cryptography

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Public Key Encryption (PKE)
  3. 3 Possible answers
  4. 4 Honest-Verifier Statistical Zero Knowledge
  5. 5 Example: Quadratic Non-Residuosity
  6. 6 Our Results: These Properties are Sufficient!
  7. 7 Instantiations
  8. 8 Perspective: Relaxing the Assumption
  9. 9 Characterization
  10. 10 Summary
  11. 11 Warmup: 2-Msg, Deterministic Prover
  12. 12 Weak Key Agreement
  13. 13 Claim: Weak Security
  14. 14 Coping with Randomized Provers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.