Главная
Study mode:
on
1
Intro
2
Crypto Tools and Constructions
3
Example: Discrete-Logarithm
4
Application: DH Key Exchange
5
Beyond DDH: Bilinear Maps
6
Main Ingredient: Testing for Zero
7
MMAP Constructions
8
Syntax of MMAPS
9
Restricting Operations
10
Examples of Tag Structures
11
The GGH13 Construction
12
Properties of GGH13
13
"Zeroizing" Attacks GGH13
14
An Attempted Fix
15
Breaking the Fix
16
The Moral (so far)
17
Non-Linear Zero-Test (GHL15)
18
Security Landscape
19
Thinking About MMAP Security
20
Known Weak Distributions
21
Other Attacks
22
Performance
Description:
Explore the current state of cryptographic multilinear maps in this comprehensive 49-minute lecture. Delve into fundamental crypto tools and constructions, starting with an introduction to discrete-logarithm and its application in DH Key Exchange. Progress beyond DDH to examine bilinear maps and the crucial concept of testing for zero. Investigate MMAP constructions, including syntax, tag structures, and the GGH13 construction. Analyze the properties and vulnerabilities of GGH13, including "zeroizing" attacks and attempted fixes. Discuss the implications of these security challenges and explore non-linear zero-test methods. Conclude by examining the security landscape of MMAPs, known weak distributions, and performance considerations. Gain a thorough understanding of this complex cryptographic topic and its current challenges.

The State of Cryptographic Multilinear Maps

TheIACR
Add to list