Skip to content

Commit ddf5906

Browse files
committed
add animations in intro slides
1 parent 703ea17 commit ddf5906

File tree

3 files changed

+38
-23
lines changed

3 files changed

+38
-23
lines changed

presentation/figures/02_key_use_comparison.tex

+2
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313
\caption{Symmetric Encryption (e.g. AES)} \label{fig:keys-symmetric}
1414
\end{subfigure}
1515
\\
16+
\pause
1617
\vspace{0.5cm}
1718
\begin{subfigure}{.8\textwidth}
1819
\centering
@@ -27,6 +28,7 @@
2728
\caption{Asymmetric Encryption (e.g. RSA)} \label{fig:keys-asymmetric}
2829
\end{subfigure}
2930
\\
31+
\pause
3032
\vspace{0.5cm}
3133
\begin{subfigure}{.8\textwidth}
3234
\centering

presentation/figures/abe_use_case.tex

+25-14
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,37 @@
11
% \begin{figure}[h]
2-
\begin{tikzpicture}[fullnode/.style={draw, minimum width=3.75cm, minimum height=1.25cm, align=center}]
2+
\begin{tikzpicture}[fullnode/.style={draw, minimum width=4cm, minimum height=1.25cm, align=center}]
33
% \draw (0, 0) node (soc) {Sensor\\(nRF52840 SoC)} |- ++(5, 0) node (gateway) {Gateway\\(Smartphone or Raspberry Pi)};
44
\node[fullnode] (soc) {Sensor \\(nRF52840 SoC)};
55
\node[fullnode] (gateway) [right=4cm of soc] {Gateway\\(e.g. Smartphone)};
66
\node[fullnode] (cloud) [below=1.5cm of gateway] {Cloud\\(e.g. AWS instance)};
7-
\node[fullnode] (kgc) [below=1.5cm of soc] {Key Generation\\Center};
7+
\onslide<5->{\node[fullnode] (kgc) [below=1.5cm of soc] {Key Generation\\Center};}
88

9-
\draw[->] (soc) -- (gateway) node [pos=0.5, align=center] {Bluetooth\\Low Energy};
10-
\draw[<->] (gateway) -- (cloud) node [pos=0.5, align=center] {Internet\\(TCP/IP)};
9+
\node [draw, dashed, fit=(soc) (gateway), inner sep=1mm, label={[anchor=south west]north west:Carried by the patient}] {};
1110

12-
\node[fullnode] (user1) [below=1.5cm of kgc] {User 1\\(e.g. Patient)};
13-
\node[fullnode] (user2) [below=1.5cm of cloud] {User 2\\(e.g. Doctor)};
11+
% \onslide<1->{
12+
\draw[->] (soc) -- (gateway) node [pos=0.5, align=center] {Bluetooth\\Low Energy};
13+
\draw[<->] (gateway) -- (cloud) node [pos=0.5, align=center] {Internet\\(TCP/IP)};
14+
% }
1415

15-
% \draw[->] (kgc) -- (gateway) node [pos=0.5] {Internet};
16-
\draw[->, dotted] (kgc) -- (soc);% node [pos=0.5, align=center] {Key exchanged\\before deployment};
17-
\draw[->, dotted] (kgc) -- (user1);% node [pos=0.5] {Internet};
18-
\draw[->, dotted] (kgc) -- (user2);% node [pos=0.5] {Internet};
19-
\draw[<->] (user1) -- (cloud) node [pos=0.25, sloped, above] {Internet};
20-
\draw[<->] (user2) -- (cloud) node [pos=0.5] {Internet};
16+
17+
\onslide<3->{
18+
\node[fullnode] (user1) [below=1.5cm of kgc] {User 1\\(e.g. Patient)};
19+
\node[fullnode] (user2) [below=1.5cm of cloud] {User 2\\(e.g. Doctor)};
20+
21+
% \draw[->] (kgc) -- (gateway) node [pos=0.5] {Internet};
22+
\draw[<->] (user1) -- (cloud) node [pos=0.25, sloped, above] {Internet};
23+
\draw[<->] (user2) -- (cloud) node [pos=0.5] {Internet};
24+
}
2125

22-
\node [draw, dashed, fit=(soc) (gateway), inner sep=1mm, label={[anchor=south west]north west:Carried by the patient}] {};
23-
\node [red, draw, dashed, fit=(gateway) (cloud), inner sep=2mm, label={[red,anchor=south]above:Not trusted}] {};
26+
\onslide<5-> {
27+
\draw[->, dotted] (kgc) -- (soc);% node [pos=0.5, align=center] {Key exchanged\\before deployment};
28+
\draw[->, dotted] (kgc) -- (user1);% node [pos=0.5] {Internet};
29+
\draw[->, dotted] (kgc) -- (user2);% node [pos=0.5] {Internet};
30+
}
31+
32+
\onslide<4-> {
33+
\node [red, draw, dashed, fit=(gateway) (cloud), inner sep=2mm, label={[red,anchor=south]above:Not trusted}] {};
34+
}
2435
\end{tikzpicture}
2536
% \caption[Simplified use case for our ABE library]{Simplified use case for end-to-end Attribute Based Encryption with encryption on a constrained sensor MCU. The ABE library developed for this thesis runs on the sensor.}
2637
% \label{fig:system-architecture}

presentation/presentation.tex

+11-9
Original file line numberDiff line numberDiff line change
@@ -78,23 +78,25 @@ \section{Introduction}
7878
\end{center}
7979
\end{frame}
8080

81-
\begin{frame}[c]
82-
\frametitle{What for?}
83-
\centering
84-
\input{figures/abe_use_case}
85-
86-
\alert{\large $\rightarrow$ Encryption on the MCU is most important!}
87-
\end{frame}
88-
8981
\section{Background}
9082
\subsection{Attribute-Based Encryption}
9183
\begin{frame}[c]
92-
\frametitle{ABE vs. standard encryption}
84+
\frametitle{Attribute-Based Encryption (ABE) vs. standard encryption}
9385
\begin{center}
9486
\input{figures/02_key_use_comparison.tex}
9587
\end{center}
9688
\end{frame}
9789

90+
\begin{frame}[c]
91+
\frametitle{What for?}
92+
\centering
93+
\input{figures/abe_use_case}
94+
95+
\onslide<2->{\alert{\large $\rightarrow$ no decryption on the MCU!}}
96+
\end{frame}
97+
98+
99+
98100
\begin{frame}[c]
99101
\frametitle{ABE interaction overview}
100102
\input{figures/abe_system_overview-1}

0 commit comments

Comments
 (0)