Главная
Study mode:
on
1
2-Party Computation Using FHE (semi-honest)
2
Advantages
3
Input Encryption
4
Homomorphic Evaluation
5
Delegate to a Cloud
6
MPC with Threshold FHE
7
MPC with TFHE
8
Related Work
9
The LWE Assumption Rev
10
Key-Homomorphic Properties of the Basic Scheme
11
Threshold Key Generation
12
Basic LWE-Based Encryption - Homomorphism
13
Evaluation Key
14
Threshold KeyGen-Round 2
15
Threshold KeyGen - End Of Round 2
16
Threshold KeyGen - Round 3
17
Threshold KeyGen - End Of Round 3
18
Threshold FHE - KeyGen
19
The MPC Protocol
20
Malicious
21
Conclusion
Description:
Explore a conference talk from Eurocrypt 2012 on multiparty computation techniques with reduced communication and computational requirements. Delve into the authors' innovative approach using fully homomorphic encryption (FHE) and threshold FHE for secure multi-party computation. Learn about the advantages of FHE in 2-party computation, including input encryption, homomorphic evaluation, and cloud delegation. Examine the Learning with Errors (LWE) assumption and its key-homomorphic properties. Discover the intricacies of threshold key generation, basic LWE-based encryption homomorphism, and evaluation keys. Understand the multi-round process of threshold key generation and its application in threshold FHE. Investigate the proposed MPC protocol and its extension to malicious adversaries. Gain insights into cutting-edge cryptographic techniques for secure multiparty computation with enhanced efficiency.

Multiparty Computation with Low Communication

TheIACR
Add to list