Completed
Protocol Structure
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Out of Band Authentication in Group Messaging - Computational, Statistical, Optimal
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Major Effort: E2E-Encrypted Messaging
- 3 Man-in-the-Middle Attacks
- 4 The User-to-User Setting
- 5 User-to-User Bounds
- 6 This Talk: The Group Setting
- 7 Our Contributions
- 8 Correctness & Security
- 9 The Naïve Protocol
- 10 Our Computationally-Secure Protocol
- 11 Example: One Possible Attack
- 12 Concurrent Non-Malleable Commitments
- 13 Our Statistical Lower Bound
- 14 Protocol Structure
- 15 Understanding H(E)