YoVDO

Succinct Non-Interactive Secure Computation

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Secure Computation Courses Fully Homomorphic Encryption Courses

Course Description

Overview

Explore a groundbreaking paper on secure computation presented at Eurocrypt 2020. Delve into the concept of Succinct Non-Interactive Secure Computation, a novel approach to two-party computation. Learn about achieving malicious security, the role of fully homomorphic encryption, and delegation of computation. Understand the main question addressed by the authors and the significance of their main theorem. Gain insights into the construction of their protocol and its implications for the field of cryptography.

Syllabus

Intro
Secure Two-Party Computation [Yao82]
Non-Interactive Secure Computation (NISC)
Achieving Malicious Security
Succinctness
Fully Homomorphic Encryption [Gen09]
Delegation of Computation
Main Question
Main Theorem
Constructing Our Protocol: Summary
Conclusion


Taught by

TheIACR

Related Courses

Fully Homomorphic Encryption, 10 Years Later - Definitions and Open Problems
Simons Institute via YouTube
FHE and Private Set Intersection
Simons Institute via YouTube
The CKKS - HEAAN FHE Scheme
Simons Institute via YouTube
Introduction to Practical FHE and the TFHE Scheme
Simons Institute via YouTube
Signatures, Commitments, Zero-Knowledge, and Applications
Simons Institute via YouTube