Главная
Study mode:
on
1
Intro
2
Motivation
3
Protocol
4
Obvious Transfer
5
Interactive Key Exchange
6
Biometric Authentication
7
Primal Form
8
Key Exchange
9
Malicious Security
10
Other Questions
11
Byzantine
12
Key Properties
13
Complexity
14
Subordinating Messages
15
Player Replaceability
16
Multiplicative Overhead
17
State of the Art
18
VA Protocol
Description:
Explore cutting-edge developments in multiparty computation through this comprehensive conference session from Asiacrypt 2022. Delve into topics such as protocol motivation, obvious transfer, interactive key exchange, and biometric authentication. Examine the intricacies of primal form, malicious security, and Byzantine key properties. Gain insights into player replaceability, multiplicative overhead, and the state-of-the-art VA Protocol. Enhance your understanding of complex cryptographic concepts and their practical applications in secure multiparty computations.

Multiparty Computation Protocols - Session 1

TheIACR
Add to list