YoVDO

Homomorphic Encryption in the SPDZ Protocol for MPC

Offered By: Simons Institute via YouTube

Tags

Homomorphic Encryption Courses Secure Computation Courses Arithmetic Circuits Courses Zero-Knowledge Proofs Courses

Course Description

Overview

Explore the intricacies of homomorphic encryption in the SPDZ protocol for secure multi-party computation in this 54-minute lecture by Peter Scholl from Aarhus University. Delve into the SPDZ setting, preprocessing model, and additive secret sharing with MACs. Learn about the online phase for securely computing arithmetic circuits and the multiplication of secret-shared values. Examine two main approaches to triple generation, focusing on threshold homomorphic encryption and its distributed decryption protocol. Understand the passive triple generation process and how active security is achieved in two steps. Investigate zero-knowledge proofs in SPDZ, including proving knowledge of short preimages. Discover variations on the basic SPDZ protocol and explore potential areas for improvement, such as enhancing zero-knowledge proofs and noise drowning in distributed decryption. Consider alternative approaches like non-interactive triple generation. Gain valuable insights into the latest developments in lattice-based cryptography and its practical applications in secure multi-party computation.

Syllabus

Intro
Secure Multi-Party Computation
The SPDZ setting
MPC in the preprocessing model
Additive secret sharing with MACS
Reconstructed shared values
SPDZ online phase : securely computing arithmetic circuits
Multiplication of secret-shared values
Triple generation: two main approaches
Threshold homomorphic encryption
Instantiating threshold homomorphic
Distributed decryption protocol
Passive triple generation: basic protocol
Active security in two steps
Zero knowledge proofs in SPDZ
Proving knowledge of short preimages
Variations on the basic SPDZ protocol
Where can we hope to do better?
Improving zero knowledge proofs
A step further removing zero knowledge proofs?
Noise drowning in distributed decryption
Alternative approach: non-interactive triploma generation
Conclusion


Taught by

Simons Institute

Related Courses

Applied Cryptography
University of Virginia via Udacity
FHE and Private Set Intersection
Simons Institute via YouTube
Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube
Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube
Cryptographic Protocols and Secure Computation I
TheIACR via YouTube