Главная
Study mode:
on
1
Intro
2
Stable Matchings
3
Privacy of Preferences
4
Secure computation?
5
What is the problem?
6
What can we do better?
7
Necessary functionality
8
Oblivious Linked List
9
Oblivious Linked Multilist
10
Complexity and Real Cost Linear Scan
11
Real Cost (Yao Gates)
12
Main Contributions
13
Caveats and Next Steps
14
Secret Sharing
Description:
Explore a conference talk on secure stable matching algorithms presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the authors' research on privacy-preserving techniques for stable matching problems at scale. Learn about the challenges of maintaining preference privacy, the concept of secure computation, and innovative approaches like Oblivious Linked Lists and Oblivious Linked Multilists. Understand the complexity and real costs associated with these algorithms, including linear scan methods and Yao Gates. Discover the main contributions of this research, potential caveats, and future directions in the field of secure stable matching.

Secure Stable Matching at Scale

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00