Google AI Professional Certificate - Learn AI Skills That Get You Hired
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking paper on scalability in public-key encryption presented at Eurocrypt 2020. Delve into multi-instance security and the scaling behavior of cryptographic schemes. Examine the Logjam attack and key-encapsulation mechanisms. Understand security notions for KEMs and the concept of scaling factor. Gain insights into multi-instance CDH-type problems and generic-group lower bounds. Grasp the intuition behind proofs and consider future directions in this 28-minute video lecture by Benedikt Auerbach, Federico Giacon, and Eike Kiltz.
Syllabus
Intro
Multi-instance security
Scaling behavior of cryptographic schemes
Background
Logjam attack
Reminder: key-encapsulation mechanisms
Security notions for KEM
Scaling factor
Overview on our results
Multi-instance CDH-type problems
Multi-instance generic-group lower bounds
Intuition behind proofs
Summary and Future Directions
Taught by
TheIACR