 In this short introduction video I would like to introduce our talk at HVACRIP 2022 on the paper titled Multi-client Functional Encryption with 5G Accent Control. So this is a genre who I could use if I'm in David Pasha one. So the main context of our paper is the Multi-client Functional Encryption paradigm or MCFE in short, where there are multiple clans. Each of them has their own private encryption key so that they can individually and independently encrypt their data under some tag which can be used to specify metadata such as timestamp. Moreover, there exists an authority that, given a functional description, can output a functional decryption key so as to combine the client's ciphertext as long as they are under the same tag and obtain the functional evaluation on the client's combined data. So this gives a snapshot of control over the information revealed about the plaintext through the functional evaluation. However, one observation is that the functional decryption key once delivered to the decryptor, its usage can be limited. That is, the decryptor can use this key in whatever way he wants. So this can be problematic in some settings where the decryptor is malicious himself. Therefore, we would like to have some control over the decryption keys. To do so, the clients now at encryption time will encrypt their data with respect to some specified attributes. And the authority is given not only the functional description but also some policy to control the client's attributes. For instance, initially we imagine that the malicious decryptor received some functional key which allows him to decrypt the client's ciphertext. Later on, the clients in the system want to revoke this malicious decryptor from decrypting their future ciphertext. They can do so by encrypting their individual data under some different attributes which are still valid with respect to some other functional decryption key which can be possessed by all these decryptors, for example. So as to allow a correct decryption. However, concerning the malicious decryptor, as soon as he tries to decrypt the newly encrypted client's ciphertext because there exist the attributes that will not satisfy the embedded policy of this adversary key, the decryption will not succeed. And thus, the adversary cannot obtain the functional evaluation anymore. Therefore, in some sense, we have revoked the malicious decryptor. So more generally, in the paper, we study this problem of multiple clients for functional decryption with far-reaching asset control over the decryption key so that the decryption puts the functional evaluation only when every client's attributes satisfy the embedded policy. Otherwise, the decryption algorithm returns nothing. In particular, we focus on the functional class that allows computing in the product and the asset control can be expressed using linear sacrificing schemes. So we propose MCFE candidates for in-app products with asset control through LSSS, achieving adaptive security in the render model and linear total communication. This improves upon prior works which focus either on single-plan schemes or had quadratic total communication. In the longer talk, we'll detail more about the context with comparisons to previous works and highlight some technical ideas which allows us to achieve our results. Thank you for your attention, and see you soon at Leiser Crypt.