Department Gathering

27-03-15

Cryptography for Seemingly Conflicting Requirements: The Cases of Accountable Privacy and Searchable Encryption

Abstract

My research over the past few years has been primarily focused on devising practical yet provably secure cryptographic schemes, for emerging computing paradigms such as the cloud environment, and for increasingly complex applications involving seemingly conflicting requirements when the participants are mutually untrustful. This talk will briefly discuss two major topics my group is working on.

Back