YoVDO

TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Computation Courses Privacy-Preserving Technology Courses Fully Homomorphic Encryption Courses Oblivious RAM Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive lecture on TWORAM, an efficient Oblivious RAM protocol, and its applications to searchable encryption. Delve into the motivation behind Oblivious RAM, examine existing work, and understand the concept of Non-Interactive Oblivious RAM. Investigate the Path Problem and its relation to Fully Homomorphic Encryption. Analyze the cost of the algorithm and its implications for searchable encryption. Conclude by exploring adaptive computation in this context. This 25-minute presentation by Sanjam Garg, Payman Mohassel, and Charalampos Papamanthou from Crypto 2016 offers valuable insights into cutting-edge cryptographic techniques.

Syllabus

Motivation
Oblivious RAM
Existing work
NonInteractive Oblivious RAM
Path
Problem
Fully Homomorphic Encryption
Cost of Algorithm
Searchable Encryption
Adaptive Computation


Taught by

TheIACR

Related Courses

Federated Learning - Machine Learning on Decentralized Data
TensorFlow via YouTube
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
tinyML via YouTube
Multiparty Computation
TheIACR via YouTube
Fast Large Scale Honest Majority MPC for Malicious Adversaries
TheIACR via YouTube
Private Resource Allocators and Their Applications
IEEE via YouTube