Completed
Background: Pseudorandom Functions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Privacy-Preserving Information Sharing - Tools and Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Prologue
- 3 Sharing Information w/ Privacy
- 4 Secure Computation (2PC)
- 5 Security in Secure Computation
- 6 Adversaries
- 7 Formalize/Prove Security (HbC)
- 8 How to Implement 2PC?
- 9 Privacy-Preserving Information Sharing with 2PC?
- 10 Private Set Intersection (PSI)
- 11 Private Set Intersection?
- 12 Straightforward PSI
- 13 Background: Pseudorandom Functions
- 14 Oblivious PRF
- 15 OPRF-based PSI
- 16 PSI w/ Data Transfer (PSI-DT) Server
- 17 A closer look at PSI
- 18 Authorized Private Set Intersection (APSI)
- 19 OPRF w/ Implicit Signature Verification
- 20 A simple OPRF-like with ISV
- 21 OPRF with ISV - Malicious Security
- 22 Set Size in PSI
- 23 SHI-PSI: The Building Blocks
- 24 Other Building Blocks
- 25 Collaborative Anomaly Detection