Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Multiparty Computation with Low Communication

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from Eurocrypt 2012 on multiparty computation techniques with reduced communication and computational requirements. Delve into the authors' innovative approach using fully homomorphic encryption (FHE) and threshold FHE for secure multi-party computation. Learn about the advantages of FHE in 2-party computation, including input encryption, homomorphic evaluation, and cloud delegation. Examine the Learning with Errors (LWE) assumption and its key-homomorphic properties. Discover the intricacies of threshold key generation, basic LWE-based encryption homomorphism, and evaluation keys. Understand the multi-round process of threshold key generation and its application in threshold FHE. Investigate the proposed MPC protocol and its extension to malicious adversaries. Gain insights into cutting-edge cryptographic techniques for secure multiparty computation with enhanced efficiency.

Syllabus

2-Party Computation Using FHE (semi-honest)
Advantages
Input Encryption
Homomorphic Evaluation
Delegate to a Cloud
MPC with Threshold FHE
MPC with TFHE
Related Work
The LWE Assumption Rev
Key-Homomorphic Properties of the Basic Scheme
Threshold Key Generation
Basic LWE-Based Encryption - Homomorphism
Evaluation Key
Threshold KeyGen-Round 2
Threshold KeyGen - End Of Round 2
Threshold KeyGen - Round 3
Threshold KeyGen - End Of Round 3
Threshold FHE - KeyGen
The MPC Protocol
Malicious
Conclusion

Taught by

TheIACR

Reviews

Start your review of Multiparty Computation with Low Communication

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.