Главная
Study mode:
on
1
Intro
2
Outline
3
Side-Channel Attack
4
Restrictions of Leakage
5
Bounded Retrieval Model
6
IBE with Auxiliary Inputs
7
Problem Statement
8
Our Contributions (1)
9
Goldreich-Levin Theorem
10
Modified GL Theorem
11
Aux-PKE - Aux-IBE
12
Our Auxiliary Input Model
13
Roadmap of Our Construction
14
Intuitions of Our Schemes
15
Our Contributions (4)
16
Extensions
17
Leakage during Setup
18
Summary of Contributions
Description:
Explore a talk from Eurocrypt 2012 on Identity-Based Encryption resilient to continual auxiliary inputs. Delve into the authors' research on side-channel attacks, leakage restrictions, and the bounded retrieval model. Learn about IBE with auxiliary inputs, the problem statement, and key contributions including the modified Goldreich-Levin Theorem. Examine the auxiliary input model, construction roadmap, and scheme intuitions. Discover extensions like leakage during setup and gain a comprehensive understanding of the authors' contributions to this cryptographic field.

Identity-Based Encryption Resilient to Continual Auxiliary Inputs

TheIACR
Add to list