Overview
Syllabus
Intro
In a nutshell: We initiate the study of Individual Cryptography
Example 1: Account sharing
Example 2: Partial reconstruction of shared secrets
The massive parallel computations
The distributed adversary
The MPC-Oracle
Formal model - the extractors
Proof of Individual Knowledge (PIK) - definition
The procedure scratch(S, Z, W)
Completeness, soundness and the extractor efficiency
How do we judge combiners?
Security Properties
Multi-Property Combiners
Cryptophia's Short Combiner Modelling
PART 3
Random Oracle Combiners
PART 4
Real World Hash Functions
Is Our Game Single-Stage?
Open Questions
Taught by
TheIACR