Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Identity-Based Encryption Resilient to Continual Auxiliary Inputs

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.

Syllabus

Intro
Outline
Side-Channel Attack
Restrictions of Leakage
Bounded Retrieval Model
IBE with Auxiliary Inputs
Problem Statement
Our Contributions (1)
Goldreich-Levin Theorem
Modified GL Theorem
Aux-PKE - Aux-IBE
Our Auxiliary Input Model
Roadmap of Our Construction
Intuitions of Our Schemes
Our Contributions (4)
Extensions
Leakage during Setup
Summary of Contributions

Taught by

TheIACR

Reviews

Start your review of Identity-Based Encryption Resilient to Continual Auxiliary Inputs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.