The Model: Leakage Tolerance Garg-Jain-Sahal, B-Canetti-Halevi
7
Previous Work
8
One-time Preprocessing: no leakage
9
Input Encoding: no leakage
10
Computation:bounded leakage
11
Main Result
12
Ingredient 1: LT Protocol for f(x,x2) Assuming no Corruptions
13
Basic Idea
14
Implementing Enc via 2-party LT 12
15
The BGJK Encoding
16
Step 1: Independent of x
17
Step 2: Aggregation
Description:
Explore leakage-tolerant computation with input-independent preprocessing in this 20-minute conference talk from Crypto 2014. Delve into multi-party computation in the presence of leakage, examining the model of leakage tolerance and previous work in the field. Learn about one-time preprocessing without leakage, input encoding, and computation with bounded leakage. Discover the main results and key ingredients, including a leakage-tolerant protocol for f(x,x2) assuming no corruptions. Understand the basic idea behind implementing encoding via 2-party leakage-tolerant computation and explore the BGJK encoding process, including steps independent of x and aggregation.
Leakage-Tolerant Computation with Input-Independent Preprocessing