YoVDO

Leakage-Tolerant Computation with Input-Independent Preprocessing

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Computation Courses Data Privacy Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore leakage-tolerant computation with input-independent preprocessing in this 20-minute conference talk from Crypto 2014. Delve into multi-party computation in the presence of leakage, examining the model of leakage tolerance and previous work in the field. Learn about one-time preprocessing without leakage, input encoding, and computation with bounded leakage. Discover the main results and key ingredients, including a leakage-tolerant protocol for f(x,x2) assuming no corruptions. Understand the basic idea behind implementing encoding via 2-party leakage-tolerant computation and explore the BGJK encoding process, including steps independent of x and aggregation.

Syllabus

Intro
Multi-Party Computation
MPC in the Presence of Leakage
This Work in a Nutshell
Outline
The Model: Leakage Tolerance Garg-Jain-Sahal, B-Canetti-Halevi
Previous Work
One-time Preprocessing: no leakage
Input Encoding: no leakage
Computation:bounded leakage
Main Result
Ingredient 1: LT Protocol for f(x,x2) Assuming no Corruptions
Basic Idea
Implementing Enc via 2-party LT 12
The BGJK Encoding
Step 1: Independent of x
Step 2: Aggregation


Taught by

TheIACR

Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera