YoVDO

Reactive Garbling - Foundation, Instantiation, Application

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Computation Courses Privacy-Preserving Technology Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the foundations, instantiation, and applications of Reactive Garbling in this 21-minute conference talk by Jesper Buus Nielsen and Samuel Ranellucci at Asiacrypt 2016. Delve into reactive computation, garbling schemes, and their applications. Examine the security definitions, global view, and capabilities of Reactive Garbling Schemes (RGS) compared to traditional Garbling Schemes (GS). Learn about vectorised garbling, output encoding, and the linking algorithm. Understand the evaluation procedure, confidentiality aspects, and a toy example. Discover applications in reactive two-party computation, black-box watchlists, and techniques for enforcing input consistency and preventing selective failure attacks.

Syllabus

Intro
Reactive computation
Garbling scheme (GS)
Applications of garbling scheme
Insecure garbling scheme Pre-processing
Security definition
Global view of garbling scheme
What can RGS do that GS can't?
GS to RGS
Vectorised garbling scheme
Output encoding string
Linking algorithm
Reactive garbling scheme
Evaluation procedure
Confidentiality
Toy example
Applications Reactive two-party computation Black-box Watchlist
Realizing reactive 2PC
Enforcing input consistency
Preventing selective failure attacks
Summary


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera