❤️ انجمن علمی دانشکده ریاضی دانشگاه صنعتی شریف (همبند) برگزار میکند:
❤️ مجموعه جلسات «گذر»
💠 عنوان: Non-Interactive Key-Exchange Protocols
🎙 ارائهدهنده: الهه صادقی
🔻 توضیحات: In this work, we initiate a study of K-NIKE protocols in the fine-grained setting, in which there is a polynomial gap between the running time of the honest parties and that of the adversary. Our goal is to show the possibility, or impossibility, of basing such protocols on weaker assumptions than those of K-NIKE for K >= 3. We improve the security by further using algebraic structures, while avoiding pairings. In particular, we show that there is a 4-party NIKE in Shoup's generic group model with a quadratic gap between the number of queries by the honest parties vs. that of the adversary.
پیشنیاز های علمی: Basic Knowledge of Group Theory and Cryptography. I will explain the intuition behind every part of the lecture though, so everyone are welcome to join.
❤️ انجمن علمی دانشکده ریاضی دانشگاه صنعتی شریف (همبند) برگزار میکند:
❤️ مجموعه جلسات «گذر»
💠 عنوان: Non-Interactive Key-Exchange Protocols
🎙 ارائهدهنده: الهه صادقی
🔻 توضیحات: In this work, we initiate a study of K-NIKE protocols in the fine-grained setting, in which there is a polynomial gap between the running time of the honest parties and that of the adversary. Our goal is to show the possibility, or impossibility, of basing such protocols on weaker assumptions than those of K-NIKE for K >= 3. We improve the security by further using algebraic structures, while avoiding pairings. In particular, we show that there is a 4-party NIKE in Shoup's generic group model with a quadratic gap between the number of queries by the honest parties vs. that of the adversary.
پیشنیاز های علمی: Basic Knowledge of Group Theory and Cryptography. I will explain the intuition behind every part of the lecture though, so everyone are welcome to join.
So, uh, whenever I hear about Telegram, it’s always in relation to something bad. What gives? Additionally, investors are often instructed to deposit monies into personal bank accounts of individuals who claim to represent a legitimate entity, and/or into an unrelated corporate account. To lend credence and to lure unsuspecting victims, perpetrators usually claim that their entity and/or the investment schemes are approved by financial authorities. "And that set off kind of a battle royale for control of the platform that Durov eventually lost," said Nathalie Maréchal of the Washington advocacy group Ranking Digital Rights. Right now the digital security needs of Russians and Ukrainians are very different, and they lead to very different caveats about how to mitigate the risks associated with using Telegram. For Ukrainians in Ukraine, whose physical safety is at risk because they are in a war zone, digital security is probably not their highest priority. They may value access to news and communication with their loved ones over making sure that all of their communications are encrypted in such a manner that they are indecipherable to Telegram, its employees, or governments with court orders. In December 2021, Sebi officials had conducted a search and seizure operation at the premises of certain persons carrying out similar manipulative activities through Telegram channels.
from ar