Overview
Dive into a comprehensive 1-hour session on advanced encryption techniques, exploring timelock applications, BLS Group G2 signatures, and post-quantum cryptography. Learn about centralized access control, attribute-based encryption schemes, and the challenges faced in traditional public key cryptography. Discover new constructions and standardization efforts in encryption, including multi-recipient integrity, key commitment, and context commitment. Gain insights into unintended behaviors and potential solutions in modern cryptographic systems. Conclude with a discussion on the future of encryption and its implications for security and privacy.
Syllabus
Introduction
Timelock Applications
BLS
Group G2 signatures
Advanced Encryption
Go
Whats next
PQB
Demo
Centralized Access Control
Traditional Public Key Cryptography
AttributeBased Encryption
Scheme
Encryption
Challenges
Features
Conclusion
Multirecipient Integrity
Unintended Behavior
Key Commitment
Context Commitment
Standardizing
New Construction
Do you need context commitment
Taught by
TheIACR