YoVDO

Topology Hiding Computation on All Graphs

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Graph Theory Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 20-minute conference talk presented at Crypto 2017 on Topology Hiding Computation on All Graphs. Delve into the paper by Adi Akavia, Rio LaVigne, and Tal Moran, which introduces innovative concepts in cryptography and network security. Learn about Topology Hiding Computation, security aspects, and Topology Hiding Broadcast. Discover the researchers' contributions, including warmup and random walk protocols, cover time analysis, semantic security, and universal exploration sequences. Gain insights into this cutting-edge research and consider the open questions posed in the field of secure distributed computing.

Syllabus

Introduction
Topology Hiding Computation
Security
Topology Hiding Broadcast
Topology Hiding Broadcast Results
Topology Hiding Computation on All Graphs
Our Contribution
Warmup Protocol
Random Walk Protocol
Cover Time
Semantic Security
Universal Exploration Sequence
Open Questions


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube