Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Two-Round Multiparty Secure Computation from Minimal Assumptions
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Secure Two-Party Computation
- 3 Secure Multiparty Computation
- 4 What is known?
- 5 Round Compression
- 6 Toy protocol
- 7 Two-Round Protocol: High level Idea
- 8 How do the garbled circuits implement rounds?
- 9 Oblivious Transfer
- 10 Two-Round Protocol for Toy Function
- 11 Functions computed by Garbled Circuits
- 12 General Case
- 13 Conclusion