Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Succinct Non-Interactive Secure Computation

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking paper on secure computation presented at Eurocrypt 2020. Delve into the concept of Succinct Non-Interactive Secure Computation, a novel approach to two-party computation. Learn about achieving malicious security, the role of fully homomorphic encryption, and delegation of computation. Understand the main question addressed by the authors and the significance of their main theorem. Gain insights into the construction of their protocol and its implications for the field of cryptography.

Syllabus

Intro
Secure Two-Party Computation [Yao82]
Non-Interactive Secure Computation (NISC)
Achieving Malicious Security
Succinctness
Fully Homomorphic Encryption [Gen09]
Delegation of Computation
Main Question
Main Theorem
Constructing Our Protocol: Summary
Conclusion

Taught by

TheIACR

Reviews

Start your review of Succinct Non-Interactive Secure Computation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.