Extractors and Secret Sharing Against Bounded Collusion Protocols

Extractors and Secret Sharing Against Bounded Collusion Protocols

IEEE FOCS: Foundations of Computer Science via YouTube Direct link

Outline

2 of 10

2 of 10

Outline

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Extractors and Secret Sharing Against Bounded Collusion Protocols

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 Complexity Theory
  4. 4 Number and Hands Model
  5. 5 Multiparty Communication Complexity
  6. 6 Main Results
  7. 7 Explicit Lower Bounds
  8. 8 Proof
  9. 9 Leakage resilient extractors
  10. 10 Whats Next

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.