MASCOT - Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Learn about MASCOT, a protocol for faster malicious arithmetic secure computation with oblivious transfer, in this conference talk presented at CCS 2016. Explore the fundamentals of secure multiparty computation (MPC) and its implementation in the preprocessing model. Discover the intricacies of the online phase, including authentication and evaluation techniques. Delve into the implementation of a trusted dealer, 1-out-of-2 oblivious transfer, and oblivious product evaluation with passive security. Examine the challenges of achieving active security in authentication and triple generation. Analyze the efficiency of the preprocessing phase and understand the basic idea behind OT extension. Gain insights into the software implementation and triple generation for 128-bit fields. Conclude with a comprehensive summary of the MASCOT protocol and its implications for secure computation.
Syllabus
Intro
(Secure) multiparty computation - MPC
MPC setting in this work
MPC in the preprocessing model
Online phase - Authentication
Online phase - Evaluation
Implementing the trusted dealer
1-out-of-2 oblivious transfer
Oblivious product evaluation - Passive security
Is this enough to get active security?
Authentication - Active security
Triples generation - Active security (2)
Efficiency of the preprocessing phase
OT extension - Basic idea
Software implementation
Triple generation for 128-bit field
Summary
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube