Главная
Study mode:
on
1
Intro
2
Motivation
3
Applications: Not Just Passwords!
4
Related Work
5
FPAKE Definition
6
Constructions
7
the Expansion Step
8
Yao's Garbled Circuits for FPAKE
9
Dual Execution for FPAKE
10
Dual Execution: Privacy-Correctness Tradeoff for Boolean Functions
11
Conclusion
Description:
Explore a comprehensive conference talk on Fuzzy Password-Authenticated Key Exchange presented at Eurocrypt 2018. Delve into the paper's key concepts, starting with an introduction to the topic, its motivation, and various applications beyond passwords. Examine related work in the field before diving into the formal definition of FPAKE. Investigate different constructions, including the crucial expansion step. Learn about Yao's Garbled Circuits and their application to FPAKE, as well as the Dual Execution technique. Analyze the privacy-correctness tradeoff for Boolean functions in Dual Execution. Conclude with a summary of the main findings and potential future directions in this area of cryptography.

Fuzzy Password-Authenticated Key Exchange

TheIACR
Add to list
0:00 / 0:00