YoVDO

The Price of Low Communication in Secure Multi-Party Computation

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Multi-Party Computation Courses Oblivious Transfer Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation on secure multi-party computation focusing on the impact of low communication. Delve into the research paper by Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, and Vassilis Zikas, presented at Crypto 2017. Examine key concepts such as static corruption, adaptive graphing, and adaptive corruption. Investigate the tightness of the adversary model and its implications. Learn about dictatorship, helpers, and oblivious transfer in the context of secure computation. Analyze the proof and negative results presented in this 25-minute talk, gaining insights into the challenges and limitations of low-communication protocols in multi-party computation.

Syllabus

Intro
The adversary
Static corruption
Why is this tight
Adaptive Graphing
Adaptive Corruption
dictatorship
helpers
oblivious transfer
Proof
Negative Result


Taught by

TheIACR

Related Courses

Secure Computation: Part I
NPTEL via Swayam
Secure Computation: Part II
NPTEL via Swayam
Advanced Cryptography: Promise and Challenges
Association for Computing Machinery (ACM) via YouTube
Secure Multi-Party Quantum Computation with a Dishonest Majority
TheIACR via YouTube
Combiners for Functional Encryption, Unconditionally
TheIACR via YouTube