The Price of Low Communication in Secure Multi-Party Computation

The Price of Low Communication in Secure Multi-Party Computation

TheIACR via YouTube Direct link

The adversary

2 of 11

2 of 11

The adversary

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Price of Low Communication in Secure Multi-Party Computation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The adversary
  3. 3 Static corruption
  4. 4 Why is this tight
  5. 5 Adaptive Graphing
  6. 6 Adaptive Corruption
  7. 7 dictatorship
  8. 8 helpers
  9. 9 oblivious transfer
  10. 10 Proof
  11. 11 Negative Result

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.