Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.
Syllabus
Intro
Outline
Side-Channel Attack
Restrictions of Leakage
Bounded Retrieval Model
IBE with Auxiliary Inputs
Problem Statement
Our Contributions (1)
Goldreich-Levin Theorem
Modified GL Theorem
Aux-PKE - Aux-IBE
Our Auxiliary Input Model
Roadmap of Our Construction
Intuitions of Our Schemes
Our Contributions (4)
Extensions
Leakage during Setup
Summary of Contributions
Taught by
TheIACR