Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Text Search Protocols with Simulation Based Security

TheIACR via YouTube

Overview

Explore a talk from PKC 2010 on Text Search Protocols with Simulation Based Security, presented by authors Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen. Delve into the intricacies of automata encryption, select and evaluation techniques, and the KNP approach. Discover applications, previous research, and a simplified protocol explanation using real-world examples like militia scenarios. Gain insights into security requirements, motivations behind the research, and the fundamental concepts of automata in cryptography. Conclude with a comprehensive understanding of text search protocols and their implications for secure information retrieval.

Syllabus

Introduction
Applications
Papers
Previous Talk
Overview
Simpler Protocol
Simpler Example
Militia Example
What is an Automata
Security Requirements
Motivations
KNP Techniques
Automata
Automata Encryption
Select
Evaluation
Conclusion

Taught by

TheIACR

Reviews

Start your review of Text Search Protocols with Simulation Based Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.