Identity-Based Encryption Resilient to Continual Auxiliary Inputs

Identity-Based Encryption Resilient to Continual Auxiliary Inputs

TheIACR via YouTube Direct link

Problem Statement

7 of 18

7 of 18

Problem Statement

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Identity-Based Encryption Resilient to Continual Auxiliary Inputs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Side-Channel Attack
  4. 4 Restrictions of Leakage
  5. 5 Bounded Retrieval Model
  6. 6 IBE with Auxiliary Inputs
  7. 7 Problem Statement
  8. 8 Our Contributions (1)
  9. 9 Goldreich-Levin Theorem
  10. 10 Modified GL Theorem
  11. 11 Aux-PKE - Aux-IBE
  12. 12 Our Auxiliary Input Model
  13. 13 Roadmap of Our Construction
  14. 14 Intuitions of Our Schemes
  15. 15 Our Contributions (4)
  16. 16 Extensions
  17. 17 Leakage during Setup
  18. 18 Summary of Contributions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.