YoVDO

Multi-Party Computation 3

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Data Security Courses Adaptive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced concepts in multi-party computation, including oblivious key-value stores, MegaHertz2K, preprocessing techniques, verification protocols, and the limitations of adaptive security in this 43-minute lecture. Gain insights into cutting-edge research and practical applications of secure multi-party computation systems, enhancing your understanding of cryptographic protocols and their real-world implementations.

Syllabus

Introduction
Questions
oblivious key value stores
end
Megahertz2K
MultiParty Computation with Preprocessing
Verification Protocols
Limits on Adaptive Security


Taught by

TheIACR

Related Courses

Multi-Party Computation 1
TheIACR via YouTube
Welcome - Functional Encryption and Identity Based Encryption
TheIACR via YouTube
Ouroboros Crypsinous Privacy Preserving Proof of Stake
IEEE via YouTube
Crypto 2023 Best Paper Plenary - Fast Lattice Reduction and Adaptive Schnorr Signatures
TheIACR via YouTube
Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
TheIACR via YouTube