Privacy in Deniable Anonymous Concurrent Authentication with Setup is Impossible: Do we Care?
Seminar Room 1, Newton Institute
AbstractIn this talk we review four stories about theoretical cryptography and their impact in practice. This includes a recent analysis of RC4, the notion of deniable interactive proof, the impossibility of strong privacy in RFID protocols, and the impossibility to UC-realize commitment.
If it doesn't, something may have gone wrong with our embedded player.
We'll get it fixed as soon as possible.