Secure Stable Matching at Scale
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a conference talk on secure stable matching algorithms presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the authors' research on privacy-preserving techniques for stable matching problems at scale. Learn about the challenges of maintaining preference privacy, the concept of secure computation, and innovative approaches like Oblivious Linked Lists and Oblivious Linked Multilists. Understand the complexity and real costs associated with these algorithms, including linear scan methods and Yao Gates. Discover the main contributions of this research, potential caveats, and future directions in the field of secure stable matching.
Syllabus
Intro
Stable Matchings
Privacy of Preferences
Secure computation?
What is the problem?
What can we do better?
Necessary functionality
Oblivious Linked List
Oblivious Linked Multilist
Complexity and Real Cost Linear Scan
Real Cost (Yao Gates)
Main Contributions
Caveats and Next Steps
Secret Sharing
Taught by
ACM CCS
Related Courses
Computability, Complexity & AlgorithmsGeorgia Institute of Technology via Udacity Decision Making in a Complex and Uncertain World
University of Groningen via FutureLearn L'avenir de la décision : connaître et agir en complexité
ESSEC Business School via Coursera Advanced Algorithms and Complexity
University of California, San Diego via Coursera Décision, Complexité, Risques
ENS de Lyon via France Université Numerique