Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Price of Low Communication in Secure Multi-Party Computation

TheIACR via YouTube

Overview

Explore a presentation on secure multi-party computation focusing on the impact of low communication. Delve into the research paper by Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, and Vassilis Zikas, presented at Crypto 2017. Examine key concepts such as static corruption, adaptive graphing, and adaptive corruption. Investigate the tightness of the adversary model and its implications. Learn about dictatorship, helpers, and oblivious transfer in the context of secure computation. Analyze the proof and negative results presented in this 25-minute talk, gaining insights into the challenges and limitations of low-communication protocols in multi-party computation.

Syllabus

Intro
The adversary
Static corruption
Why is this tight
Adaptive Graphing
Adaptive Corruption
dictatorship
helpers
oblivious transfer
Proof
Negative Result

Taught by

TheIACR

Reviews

Start your review of The Price of Low Communication in Secure Multi-Party Computation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.