Главная
Study mode:
on
1
Intro
2
Basic Communication
3
Solution: Encryption
4
Threat Model 2
5
Local Encryption
6
Using the Data
7
What do we want
8
Homowhatism
9
Some Examples
10
Intuition
11
Open the Country Gates
12
Example: Search
13
Final Encryption
14
What about Integrity?
15
Questions?
Description:
Explore the strengths and limitations of applied homomorphic encryption in this informative talk. Delve into the workings of RSA encryption and discover a critical pitfall it faces, which homomorphic encryption aims to address. Gain insights into these encryption models through the lens of the Confidentiality-Integrity-Availability (CIA) Triad. Learn about basic communication, local encryption, data usage, and the concept of homomorphism in cryptography. Examine practical examples, including search functionality in encrypted data, and understand the implications for data integrity. Enhance your understanding of this largely theoretical yet promising field in modern cryptography.

Homomorphic Encryption - Nick Gonella

White Hat Cal Poly
Add to list
0:00 / 0:00