YoVDO

Multiparty Computation with Low Communication

Offered By: TheIACR via YouTube

Tags

Fully Homomorphic Encryption Courses Cryptography Courses Secure Computation Courses Privacy-Preserving Technology Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from Eurocrypt 2012 on multiparty computation techniques with reduced communication and computational requirements. Delve into the authors' innovative approach using fully homomorphic encryption (FHE) and threshold FHE for secure multi-party computation. Learn about the advantages of FHE in 2-party computation, including input encryption, homomorphic evaluation, and cloud delegation. Examine the Learning with Errors (LWE) assumption and its key-homomorphic properties. Discover the intricacies of threshold key generation, basic LWE-based encryption homomorphism, and evaluation keys. Understand the multi-round process of threshold key generation and its application in threshold FHE. Investigate the proposed MPC protocol and its extension to malicious adversaries. Gain insights into cutting-edge cryptographic techniques for secure multiparty computation with enhanced efficiency.

Syllabus

2-Party Computation Using FHE (semi-honest)
Advantages
Input Encryption
Homomorphic Evaluation
Delegate to a Cloud
MPC with Threshold FHE
MPC with TFHE
Related Work
The LWE Assumption Rev
Key-Homomorphic Properties of the Basic Scheme
Threshold Key Generation
Basic LWE-Based Encryption - Homomorphism
Evaluation Key
Threshold KeyGen-Round 2
Threshold KeyGen - End Of Round 2
Threshold KeyGen - Round 3
Threshold KeyGen - End Of Round 3
Threshold FHE - KeyGen
The MPC Protocol
Malicious
Conclusion


Taught by

TheIACR

Related Courses

Federated Learning - Machine Learning on Decentralized Data
TensorFlow via YouTube
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
tinyML via YouTube
Multiparty Computation
TheIACR via YouTube
Fast Large Scale Honest Majority MPC for Malicious Adversaries
TheIACR via YouTube
Private Resource Allocators and Their Applications
IEEE via YouTube