YoVDO

More Communication Lower Bounds for Information-Theoretic MPC

Offered By: Paul G. Allen School via YouTube

Tags

Computer Science Courses Cryptography Courses

Course Description

Overview

Explore communication lower bounds for information-theoretic secure multiparty computation in this conference talk from the ITC Conference. Delve into two classes of lower bounds: one for perfect passive secure multiparty computation with n=2t+1 parties, and another for perfect maliciously secure setting with n=3t+1 parties. Examine the proof of a lower bound applicable to secure evaluation of any function, assuming parties can choose to learn or not learn the output. Investigate the existence of a reactive functionality requiring Ω(nS) bits of communication for perfect malicious security implementation. Learn how these results extend to suboptimal thresholds and their implications for Boolean circuits and finite fields. Gain insights into functional entropy, examples, and statistical security through a comprehensive exploration of secure multiparty computation challenges and advancements.

Syllabus

Intro
Secure multiparty computation
Communication lower bounds
Our questions
Our results
Functional entropy
Lower bound, max threshold n=2+1
Examples
A reactive functionality
Lower bound, four parties
Lower bound, 3+1 parties
An upper bound for 14
Statistical security
Conclusion


Taught by

Paul G. Allen School

Related Courses

Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Security
Stanford University via Coursera
Intro to Computer Science
University of Virginia via Udacity
Introduction to Logic
Stanford University via Coursera
Internet History, Technology, and Security
University of Michigan via Coursera