YoVDO

Extractors and Secret Sharing Against Bounded Collusion Protocols

Offered By: IEEE via YouTube

Tags

IEEE FOCS: Foundations of Computer Science Courses Cryptography Courses Complexity Theory Courses

Course Description

Overview

Explore a 35-minute IEEE conference talk delving into extractors and secret sharing techniques designed to counter bounded collusion protocols. Learn from experts Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, and David Zuckerman as they discuss complexity theory, the number and hands model, multiparty communication complexity, and explicit lower bounds. Gain insights into leakage-resilient extractors and discover future research directions in this field.

Syllabus

Introduction
Outline
Complexity Theory
Number and Hands Model
Multiparty Communication Complexity
Main Results
Explicit Lower Bounds
Proof
Leakage resilient extractors
Whats Next


Taught by

IEEE FOCS: Foundations of Computer Science

Tags

Related Courses

An Improved Exponential-Time Approximation Algorithm for Fully-Alternating Games Against Nature
IEEE via YouTube
Computation in the Brain Tutorial - Part 2
IEEE via YouTube
Computation in the Brain - Part 1
IEEE via YouTube
Spectral Independence in High-Dimensional Expanders and Applications to the Hardcore Model
IEEE via YouTube
Cookbook Lower Bounds for Statistical Inference in Distributed and Constrained Settings - Part 1
IEEE via YouTube