YoVDO

Secure Stable Matching at Scale

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Secure Computation Courses Privacy Courses Complexity Courses

Course Description

Overview

Explore a conference talk on secure stable matching algorithms presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the authors' research on privacy-preserving techniques for stable matching problems at scale. Learn about the challenges of maintaining preference privacy, the concept of secure computation, and innovative approaches like Oblivious Linked Lists and Oblivious Linked Multilists. Understand the complexity and real costs associated with these algorithms, including linear scan methods and Yao Gates. Discover the main contributions of this research, potential caveats, and future directions in the field of secure stable matching.

Syllabus

Intro
Stable Matchings
Privacy of Preferences
Secure computation?
What is the problem?
What can we do better?
Necessary functionality
Oblivious Linked List
Oblivious Linked Multilist
Complexity and Real Cost Linear Scan
Real Cost (Yao Gates)
Main Contributions
Caveats and Next Steps
Secret Sharing


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube