Главная
Study mode:
on
1
Introduction
2
Motivation and application
3
Security properties
4
Existing solution
5
Voting game
6
TCC security
7
Twistable primitive
8
Constructions
9
CPA encryption
10
Voting system
11
Conclusion
12
Question
13
Computing encrypted data
14
Main contribution
15
Equijoin queries
16
Joint crosstags
17
JXT
18
Technical Overview
19
Example
20
Questions
21
Witness Encryption
22
Results
23
Evasion automation
24
Branching programs
25
CVW obfuscation
26
Proof of security
27
Conclusions
Description:
Explore advanced encryption concepts in this comprehensive session from Asiacrypt 2022. Delve into motivation, applications, and security properties of encryption systems. Examine existing solutions, including voting games and TCC security. Learn about twistable primitives, CPA encryption, and voting system constructions. Discover techniques for computing encrypted data, with a focus on equijoin queries and joint crosstags (JXT). Investigate witness encryption, branching programs, and CVW obfuscation. Gain insights into evasion automation and proof of security methodologies. Conclude with a Q&A session to reinforce understanding of these cutting-edge encryption topics.

Advanced Encryption Techniques - Session 1

TheIACR
Add to list
0:00 / 0:00