Completed
Elliptic curves
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Attacks Against Attribute-based Encryption
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Motivation
- 3 Overview
- 4 Introduction to ABE
- 5 Ciphertext-policy (CP) ABE
- 6 Multi-authority ABE: corruption
- 7 Applications of ABE in the Cloud
- 8 Components of ABE
- 9 Elliptic curves
- 10 Pairings
- 11 Secret sharing
- 12 Toy example
- 13 How ABE schemes fail in theory
- 14 Pairing-free elliptic-curve schemes
- 15 Venema-Alpár framework
- 16 Attack on DAC-MACS
- 17 Attack on YJ14
- 18 Open-source ABE implementations
- 19 Concluding remarks