Succinct Non-Interactive Secure Computation
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper on secure computation presented at Eurocrypt 2020. Delve into the concept of Succinct Non-Interactive Secure Computation, a novel approach to two-party computation. Learn about achieving malicious security, the role of fully homomorphic encryption, and delegation of computation. Understand the main question addressed by the authors and the significance of their main theorem. Gain insights into the construction of their protocol and its implications for the field of cryptography.
Syllabus
Intro
Secure Two-Party Computation [Yao82]
Non-Interactive Secure Computation (NISC)
Achieving Malicious Security
Succinctness
Fully Homomorphic Encryption [Gen09]
Delegation of Computation
Main Question
Main Theorem
Constructing Our Protocol: Summary
Conclusion
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera