The State of Cryptographic Multilinear Maps

The State of Cryptographic Multilinear Maps

TheIACR via YouTube Direct link

Properties of GGH13

12 of 22

12 of 22

Properties of GGH13

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The State of Cryptographic Multilinear Maps

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Crypto Tools and Constructions
  3. 3 Example: Discrete-Logarithm
  4. 4 Application: DH Key Exchange
  5. 5 Beyond DDH: Bilinear Maps
  6. 6 Main Ingredient: Testing for Zero
  7. 7 MMAP Constructions
  8. 8 Syntax of MMAPS
  9. 9 Restricting Operations
  10. 10 Examples of Tag Structures
  11. 11 The GGH13 Construction
  12. 12 Properties of GGH13
  13. 13 "Zeroizing" Attacks GGH13
  14. 14 An Attempted Fix
  15. 15 Breaking the Fix
  16. 16 The Moral (so far)
  17. 17 Non-Linear Zero-Test (GHL15)
  18. 18 Security Landscape
  19. 19 Thinking About MMAP Security
  20. 20 Known Weak Distributions
  21. 21 Other Attacks
  22. 22 Performance

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.