YoVDO

The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency

Offered By: IEEE via YouTube

Tags

IEEE FOCS: Foundations of Computer Science Courses Cryptography Courses Information Theory Courses

Course Description

Overview

Explore the intricacies of perfect Multi-Party Computation (MPC) with active security and optimal resiliency in this 26-minute IEEE conference talk. Delve into information-theoretic aspects, constant round complexity, and recent developments in the field. Learn about the BGW protocol for degree-2 polynomials, techniques for trading errors with erasures, and the concept of second-level multiplication. Examine protocol folding, the reduction of binary degree-2 to arithmetic, and the impossibility of 3-round T=n/4 protocols. Investigate Verifiable Secret Sharing (VSS) and its relation to MPC, as well as the process of protocol chopping. Gain insights into the analysis of MPC guarantees and VSS properties, ultimately understanding the landscape of perfect MPC protocols.

Syllabus

Intro
Information-Theoretic (Perfect)
Constant Round Complex
Recent Developments
Our Results
Starting point: BGW for deg-2
Trading errors with erasures
Second-Level Multiplication
Protocol Folding
Are We Done?
Reducing Binary deg-2 to Arithmetic
Impossibility of 3-round T=n/4 pro
Verifiable Secret Sharing CGMA
Chopping a Protocol
Analysis: Properties of f + MPC gua
MPC and VSS
The Landscape of Perfect


Taught by

IEEE FOCS: Foundations of Computer Science

Tags

Related Courses

An Improved Exponential-Time Approximation Algorithm for Fully-Alternating Games Against Nature
IEEE via YouTube
Computation in the Brain Tutorial - Part 2
IEEE via YouTube
Computation in the Brain - Part 1
IEEE via YouTube
Spectral Independence in High-Dimensional Expanders and Applications to the Hardcore Model
IEEE via YouTube
Cookbook Lower Bounds for Statistical Inference in Distributed and Constrained Settings - Part 1
IEEE via YouTube