Overview
Explore advanced concepts in multi-party computation, including oblivious key-value stores, MegaHertz2K, preprocessing techniques, verification protocols, and the limitations of adaptive security in this 43-minute lecture. Gain insights into cutting-edge research and practical applications of secure multi-party computation systems, enhancing your understanding of cryptographic protocols and their real-world implementations.
Syllabus
Introduction
Questions
oblivious key value stores
end
Megahertz2K
MultiParty Computation with Preprocessing
Verification Protocols
Limits on Adaptive Security
Taught by
TheIACR