YoVDO

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cryptography Courses Secure Computation Courses Computer Security Courses

Course Description

Overview

Explore a groundbreaking conference talk presented at the 23rd ACM Conference on Computer and Communications Security (CCS 2016) in Vienna, Austria. Delve into the innovative research on high-throughput semi-honest secure three-party computation with an honest majority. Learn from authors Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara as they present their findings on this cutting-edge topic in cryptography and secure computation. Gain insights into the latest advancements in multi-party computation techniques and their potential applications in secure data processing and privacy-preserving technologies.

Syllabus

CCS 2016 - High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube