Topology Hiding Computation on All Graphs
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a 20-minute conference talk presented at Crypto 2017 on Topology Hiding Computation on All Graphs. Delve into the paper by Adi Akavia, Rio LaVigne, and Tal Moran, which introduces innovative concepts in cryptography and network security. Learn about Topology Hiding Computation, security aspects, and Topology Hiding Broadcast. Discover the researchers' contributions, including warmup and random walk protocols, cover time analysis, semantic security, and universal exploration sequences. Gain insights into this cutting-edge research and consider the open questions posed in the field of secure distributed computing.
Syllabus
Introduction
Topology Hiding Computation
Security
Topology Hiding Broadcast
Topology Hiding Broadcast Results
Topology Hiding Computation on All Graphs
Our Contribution
Warmup Protocol
Random Walk Protocol
Cover Time
Semantic Security
Universal Exploration Sequence
Open Questions
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera