This live moderated discussion will focus on theory, featuring the authors of these papers: 1) On Fingerprinting Attacks and Length-Hiding Encryption; 2) CCA security for Posteriori Openable Encryption and Generic Instantiation in the Standard Model; and 3) Dynamic Universal Accumulator with Batch Update over Bilinear Groups. Join to ask questions and learn from the experts.
Technology Infrastructure & Operations
cryptography
FIRST-COME, FIRST-SERVED SEATING
Session Code
CRYP-2
Share With Your Community