Secure Multiparty Computation

Secure Multiparty Computation

Simons Institute via YouTube Direct link

In hardware we trust?

23 of 26

23 of 26

In hardware we trust?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Secure Multiparty Computation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Going digital...
  3. 3 How to store important data
  4. 4 What about confidentiality?
  5. 5 Solution 1: Encryption
  6. 6 Solution II: Secret Sharing
  7. 7 Can we still search the data?
  8. 8 A Decentralized Alternative
  9. 9 Rest of Talk
  10. 10 MPC is more general than it may seem
  11. 11 How much do we earn?
  12. 12 A better way?
  13. 13 A security concern
  14. 14 Resisting collusions
  15. 15 From Theory to Practice?
  16. 16 Landscape of Definitions
  17. 17 From Truth-Tables to Circuits
  18. 18 Features of Circuit-Based Protocol
  19. 19 Dealer-free MPC for f(x,y,z)
  20. 20 The "BGW" protocol
  21. 21 Yao's Protocol
  22. 22 Dealing with active adversary
  23. 23 In hardware we trust?
  24. 24 Open Questions: Feasibility
  25. 25 Open Questions: Communication
  26. 26 Open Questions: Computation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.