The use of “computation over encrypted data.” For example, how can we perform a query over Visit your bank’s website and see a green “padlock” symbol in your browser.Ĭryptography can also be used for much more than just secure channels. Lets Alice and Bob send messages, (e.g., “Let’s meet by the bridge at 5pm!”) while preventingĪn eavesdropper Eve from observing the message or tampering with the contents.Ĭryptography is already widely deployed, for example the TLS protocol is used every time you Traditionally, cryptography is concerned with communication channels that Lectures are also available online via Echo360.Īndrew: Thursdays 2:30pm-3:30pm Yunqi: Wednesday 2:30pm-3:30pmĬryptographic protocols are fundamental techniques for building secure systems, even against
0 Comments
Leave a Reply. |