Completed
Example 1 Proxy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Functional Encryption
- 3 Functional Encryption Algorithms
- 4 Example 1 Proxy
- 5 Example 2 Audit
- 6 Randomized Functional Encryption
- 7 Results
- 8 correctness definition
- 9 bad randomness
- 10 example
- 11 generic transformation
- 12 key generation algorithm
- 13 hiding properties
- 14 encryption
- 15 encryption algorithm
- 16 summary
- 17 open questions