Главная
Study mode:
on
1
Intro
2
Multi-Party Computation
3
MPC in the Presence of Leakage
4
This Work in a Nutshell
5
Outline
6
The Model: Leakage Tolerance Garg-Jain-Sahal, B-Canetti-Halevi
7
Previous Work
8
One-time Preprocessing: no leakage
9
Input Encoding: no leakage
10
Computation:bounded leakage
11
Main Result
12
Ingredient 1: LT Protocol for f(x,x2) Assuming no Corruptions
13
Basic Idea
14
Implementing Enc via 2-party LT 12
15
The BGJK Encoding
16
Step 1: Independent of x
17
Step 2: Aggregation
Description:
Explore leakage-tolerant computation with input-independent preprocessing in this 20-minute conference talk from Crypto 2014. Delve into multi-party computation in the presence of leakage, examining the model of leakage tolerance and previous work in the field. Learn about one-time preprocessing without leakage, input encoding, and computation with bounded leakage. Discover the main results and key ingredients, including a leakage-tolerant protocol for f(x,x2) assuming no corruptions. Understand the basic idea behind implementing encoding via 2-party leakage-tolerant computation and explore the BGJK encoding process, including steps independent of x and aggregation.

Leakage-Tolerant Computation with Input-Independent Preprocessing

TheIACR
Add to list
0:00 / 0:00