Multi-Party Computation 3
Offered By: TheIACR via YouTube
Course Description
Overview
Explore advanced concepts in multi-party computation, including oblivious key-value stores, MegaHertz2K, preprocessing techniques, verification protocols, and the limitations of adaptive security in this 43-minute lecture. Gain insights into cutting-edge research and practical applications of secure multi-party computation systems, enhancing your understanding of cryptographic protocols and their real-world implementations.
Syllabus
Introduction
Questions
oblivious key value stores
end
Megahertz2K
MultiParty Computation with Preprocessing
Verification Protocols
Limits on Adaptive Security
Taught by
TheIACR
Related Courses
Multi-Party Computation 1TheIACR via YouTube Welcome - Functional Encryption and Identity Based Encryption
TheIACR via YouTube Ouroboros Crypsinous Privacy Preserving Proof of Stake
IEEE via YouTube Crypto 2023 Best Paper Plenary - Fast Lattice Reduction and Adaptive Schnorr Signatures
TheIACR via YouTube Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
TheIACR via YouTube