YoVDO

The IPS Compiler - Optimizations, Variants and Concrete Efficiency

Offered By: TheIACR via YouTube

Tags

Secure Computation Courses Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of the IPS compiler for secure multi-party computation in this 21-minute conference talk from Crypto 2011. Delve into optimizations, variants, and concrete efficiency of the compiler, which constructs protocols secure against malicious adversaries without an honest majority. Learn about improvements to the watchlist setup phase, a simpler variant using covert adversary protocols, and its potential for more efficient asymptotic security. Examine the compiler's concrete efficiency and its competitiveness with current efficient protocols. Gain insights into secure computation settings, adversary models, and the GMW construction paradigm as you follow the detailed syllabus covering key aspects of this innovative approach to cryptographic protocol design.

Syllabus

Intro
Secure Computation Settings
Adversary Models
A Construction Paradigm GMW
The IPS Compiler
The Basic Idea
Server Simulation by Clients
Security of Inner Protocols
Our Results
Optimizations
Variants
Concrete Efficiency
Number of Servers - Analysis
Difficulties
Experimental Results
Conclusions - IPS Efficiency
Summary


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
FHE and Private Set Intersection
Simons Institute via YouTube
Homomorphic Encryption in the SPDZ Protocol for MPC
Simons Institute via YouTube
Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube
Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube