YoVDO

Multiparty Computation Protocols - Session 1

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Biometric Authentication Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge developments in multiparty computation through this comprehensive conference session from Asiacrypt 2022. Delve into topics such as protocol motivation, obvious transfer, interactive key exchange, and biometric authentication. Examine the intricacies of primal form, malicious security, and Byzantine key properties. Gain insights into player replaceability, multiplicative overhead, and the state-of-the-art VA Protocol. Enhance your understanding of complex cryptographic concepts and their practical applications in secure multiparty computations.

Syllabus

Intro
Motivation
Protocol
Obvious Transfer
Interactive Key Exchange
Biometric Authentication
Primal Form
Key Exchange
Malicious Security
Other Questions
Byzantine
Key Properties
Complexity
Subordinating Messages
Player Replaceability
Multiplicative Overhead
State of the Art
VA Protocol


Taught by

TheIACR

Related Courses

Cyber Security Foundations: Identity and Access Management
EC-Council via FutureLearn
Biometric Authentication for iOS in Swift
LinkedIn Learning
Web Security: User Authentication and Access Control
LinkedIn Learning
Supporting Face ID and Touch ID Authentication in iOS Using Swift 5
Pluralsight
Configuring Windows 10 Devices: Manage Identity
Pluralsight