Главная
Study mode:
on
1
Intro
2
Secure Two-Party Computation
3
Secure Multiparty Computation
4
What is known?
5
Round Compression
6
Toy protocol
7
Two-Round Protocol: High level Idea
8
How do the garbled circuits implement rounds?
9
Oblivious Transfer
10
Two-Round Protocol for Toy Function
11
Functions computed by Garbled Circuits
12
General Case
13
Conclusion
Description:
Explore a groundbreaking paper on secure multiparty computation presented at Eurocrypt 2018. Delve into the work of Sanjam Garg and Akshayaram Srinivasan as they introduce a two-round protocol for secure multiparty computation based on minimal assumptions. Learn about the foundations of secure two-party and multiparty computation, round compression techniques, and the innovative toy protocol. Understand the high-level idea behind the two-round protocol, including the implementation of garbled circuits and oblivious transfer. Examine the application of this protocol to toy functions and its extension to general cases. Gain insights into the latest advancements in cryptographic protocols and their potential impact on secure computation.

Two-Round Multiparty Secure Computation from Minimal Assumptions

TheIACR
Add to list
0:00 / 0:00