Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about a novel cryptographic scheme in this 21-minute conference talk from PKC 2020. Explore the Verifiable Inner Product Encryption Scheme, presented by researchers Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, and Peter Y. A. Ryan. Delve into the construction of the scheme, including its encryption algorithm, and understand its applications in cryptography. Examine the conflicting requirements and how they are addressed, as well as the results of the research. Gain insights into verifiable functional encryption and its importance in modern cryptographic systems.
Syllabus
Introduction
Outline
Example
Verifiable Fe
Conflicting Requirements
Product Encryption Scheme
Constructing LPD
Encryption Algorithm
Results
Application
Verification
Taught by
TheIACR