YoVDO

On the Feasibility of Consistent Computations

Offered By: TheIACR via YouTube

Tags

Secure Computation Courses Cryptography Courses Privacy Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a talk from PKC 2010 on the feasibility of consistent computations, presented by authors Sven Laur and Helger Lipmaa. Delve into topics such as privacy, two-party security models, complaint handling, and client disclosure of secrets. Learn about the motivations behind consistent computations, their construction, communication aspects, and security implications. Examine the simulation process and discover how to make computations consistent. Conclude with a summary and engage in a question-and-answer session to deepen your understanding of this cryptographic concept.

Syllabus

Introduction
Motivation
Privacy
Twoparty security model
Complaint handling
Motivations
Construction
Communication
Security
Simulation
Client
Disclosure of Secrets
Making it Consistent
Summary
Questions


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera