Multiparty Computation Protocols - Session 1
Offered By: TheIACR via YouTube
Course Description
Overview
Explore cutting-edge developments in multiparty computation through this comprehensive conference session from Asiacrypt 2022. Delve into topics such as protocol motivation, obvious transfer, interactive key exchange, and biometric authentication. Examine the intricacies of primal form, malicious security, and Byzantine key properties. Gain insights into player replaceability, multiplicative overhead, and the state-of-the-art VA Protocol. Enhance your understanding of complex cryptographic concepts and their practical applications in secure multiparty computations.
Syllabus
Intro
Motivation
Protocol
Obvious Transfer
Interactive Key Exchange
Biometric Authentication
Primal Form
Key Exchange
Malicious Security
Other Questions
Byzantine
Key Properties
Complexity
Subordinating Messages
Player Replaceability
Multiplicative Overhead
State of the Art
VA Protocol
Taught by
TheIACR
Related Courses
Cyber Security Foundations: Identity and Access ManagementEC-Council via FutureLearn Biometric Authentication for iOS in Swift
LinkedIn Learning Web Security: User Authentication and Access Control
LinkedIn Learning Supporting Face ID and Touch ID Authentication in iOS Using Swift 5
Pluralsight Configuring Windows 10 Devices: Manage Identity
Pluralsight