YoVDO

Multi-party Computation II - Session 12

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Distributed Computing Courses Adaptive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into an advanced exploration of Multi-party Computation in this 56-minute lecture from TheIACR. Examine key concepts such as adaptive security of multiparty products, efficient transparent arguments, and bulletproofs. Learn about polynomial commitment, two-party PM, and previous works in the field. Discover new results and techniques for K parties, and understand hard terms related to the subject. The lecture concludes with a summary of CSAR, its participants, goals, main ideas, and primary results, followed by a Q&A session to clarify complex topics.

Syllabus

Introduction
Question
Adaptive Security of Multiparty Products
Efficient Transparent Arguments
bulletproofs
polynomial commitment
Twoparty PM
Previous works
New results
Technique
K Parties
Hard Terms
Summary
CSAR
Participants
Goals
Main Idea
Main Result
QA


Taught by

TheIACR

Related Courses

Multi-Party Computation 1
TheIACR via YouTube
Welcome - Functional Encryption and Identity Based Encryption
TheIACR via YouTube
Ouroboros Crypsinous Privacy Preserving Proof of Stake
IEEE via YouTube
Crypto 2023 Best Paper Plenary - Fast Lattice Reduction and Adaptive Schnorr Signatures
TheIACR via YouTube
Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
TheIACR via YouTube