Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Multi-Party Computation 3

TheIACR via YouTube

Overview

Explore advanced concepts in multi-party computation, including oblivious key-value stores, MegaHertz2K, preprocessing techniques, verification protocols, and the limitations of adaptive security in this 43-minute lecture. Gain insights into cutting-edge research and practical applications of secure multi-party computation systems, enhancing your understanding of cryptographic protocols and their real-world implementations.

Syllabus

Introduction
Questions
oblivious key value stores
end
Megahertz2K
MultiParty Computation with Preprocessing
Verification Protocols
Limits on Adaptive Security

Taught by

TheIACR

Reviews

Start your review of Multi-Party Computation 3

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.