YoVDO

Leakage Resilient Secret Sharing Against Colluding Parties

Offered By: IEEE via YouTube

Tags

IEEE FOCS: Foundations of Computer Science Courses Cryptography Courses Data Protection Courses

Course Description

Overview

Explore the concept of Leakage Resilient Secret Sharing Against Colluding Parties in this 20-minute IEEE conference talk. Delve into the intricacies of leakage-resilient secret sharing, bounded collusion protocols, and their applications in communication complexity. Examine the main results, including the logarithmic barrier and tampering adversaries. Learn about non-malleable secret sharing and leakage-resilient NMSS. Discover the two-phase approach involving (.p+1.+1)-LRSS and lifting techniques, as well as the scatter and reuse shares method. Consider open problems in the field and gain insights from speakers Ashutosh Kumar, Raghu Meka, and Amit Sahai.

Syllabus

Intro
Leakage?
Leakage-Resilient Secret Sharing
Limitations of Model
Modeling Leakage
Bounded Collusion Protocols (BCP)
BCPs in Communication Complexity
Leakage-Resilience against CPS
Our Main Result
Logarithmic Barrier
Tampering adversaries?
Non-malleable Secret Sharing
Leakage-Resilient NMSS
Concurrent and independent Work
Outline
Phase 1: (.p+1.+1)-LRSS
Phase 2: Lifting
Scatter and Reuse Shares
Disjoint subsets?
Open Problems
Thank you


Taught by

IEEE FOCS: Foundations of Computer Science

Tags

Related Courses

An Improved Exponential-Time Approximation Algorithm for Fully-Alternating Games Against Nature
IEEE via YouTube
Computation in the Brain Tutorial - Part 2
IEEE via YouTube
Computation in the Brain - Part 1
IEEE via YouTube
Spectral Independence in High-Dimensional Expanders and Applications to the Hardcore Model
IEEE via YouTube
Cookbook Lower Bounds for Statistical Inference in Distributed and Constrained Settings - Part 1
IEEE via YouTube