Главная
Study mode:
on
1
Intro
2
Secure Two-Party Computation [Yao82]
3
Non-Interactive Secure Computation (NISC)
4
Achieving Malicious Security
5
Succinctness
6
Fully Homomorphic Encryption [Gen09]
7
Delegation of Computation
8
Main Question
9
Main Theorem
10
Constructing Our Protocol: Summary
11
Conclusion
Description:
Explore a groundbreaking paper on secure computation presented at Eurocrypt 2020. Delve into the concept of Succinct Non-Interactive Secure Computation, a novel approach to two-party computation. Learn about achieving malicious security, the role of fully homomorphic encryption, and delegation of computation. Understand the main question addressed by the authors and the significance of their main theorem. Gain insights into the construction of their protocol and its implications for the field of cryptography.

Succinct Non-Interactive Secure Computation

TheIACR
Add to list
0:00 / 0:00