FYI<br><div class="gmail_quote">
  

    
  
  <div bgcolor="#FFFFFF" text="#000000">
    <font face="Times New Roman, Times, serif"><big><big>Theory
          Colloquium: <br>
          Identity-Based Encryption:  Past, Present, and Future <br>
          Dan Boneh, Stanford <br>
          Wed May 2 @ 4 PM</big></big></font><br>
    <div dir="ltr">
      <div>
        <div class="gmail_quote">
          <br>
          ARRIVAL GUIDANCE:<br>
          Upon arrival, be prepared to show a picture ID and sign the
          Building Visitor Log when approaching the Lobby Floor Security
          Desk. Alert them to the name of the MSR event you are
          attending and ask them to direct you to the appropriate floor.
          Typically the talks are located in the First Floor Conference
          Center, however sometimes the location may change.<br>
          <br>
******************************************************************************************************************************<br>
******************************************************************************************************************************<br>
          WHO:                          Dan Boneh<br>
          AFFILIATION:             Stanford<br>
          TITLE:                         Identity-Based Encryption:
           Past, Present, and Future<br>
          HOST:                         Boaz Barak<br>
          WHEN:                        Wednesday May 2nd<br>
          WHERE:                     Microsoft Conference Center located
          at One Memorial Drive, First Floor, Cambridge, MA<br>
          TIME:                          4:00 PM – 5:30 PM<br>
******************************************************************************************************************************<br>
          <br>
          Abstract<br>
          <br>
          Identity Based encryption (IBE) is a public-key encryption
          system where any string can function as a public key.  IBE
          systems imply chosen ciphertext secure encryption, searching
          on encrypted data, secure signatures, and many other
          cryptographic primitives. Over the past decade three families
          of IBE constructions were developed: one family uses
          pairing-friendly elliptic curve, another uses arithmetic
          modulo composites, and a third uses integer lattices.   This
          talk will survey some recent IBE constructions and highlight a
          few central open problems in this area.<br>
          <br>
******************************************************************************************************************************<br>
******************************************************************************************************************************<br>
        </div>
        <br>
      </div>
    </div>
  </div>

<br>_______________________________________________<br>
Cis-seminars mailing list<br>
<a href="mailto:Cis-seminars@lists.csail.mit.edu">Cis-seminars@lists.csail.mit.edu</a><br>
<a href="https://lists.csail.mit.edu/mailman/listinfo/cis-seminars" target="_blank">https://lists.csail.mit.edu/mailman/listinfo/cis-seminars</a><br>
<br></div><br><br clear="all"><br>-- <br>Sharon Goldberg<br>Computer Science, Boston University<br><a href="http://www.cs.bu.edu/~goldbe" target="_blank">http://www.cs.bu.edu/~goldbe</a><br>