Главная
Study mode:
on
1
Introduction
2
About Ahto
3
What is Secure MultiParty Computation
4
History of Secure MultiParty Computation
5
How can we do it
6
Homomorphic Encryption
7
Fully Homomorphic Encryption
8
Garbage Circuits
9
Secret Sharing
10
Security Properties
11
Information Theory Security
12
Additive Secret Sharing
13
Additive Equal Sharing
14
Resharing
Description:
Explore secure multi-party computation in this comprehensive conference talk from ACCU 2023. Learn how to jointly compute on private data without revealing inputs while still obtaining outputs. Discover protocols and techniques for scenarios where a mutually trusted party is unavailable. Delve into concepts like homomorphic encryption, garbage circuits, and secret sharing using high-school level algebra. Gain insights into the history, security properties, and practical applications of secure multi-party computation. Understand additive secret sharing, equal sharing, and resharing techniques to enhance data privacy and collaboration in computational tasks.

Introduction to Secure Multi-Party Computation

ACCU Conference
Add to list
0:00 / 0:00