Главная
Study mode:
on
1
Intro
2
Going digital...
3
How to store important data
4
What about confidentiality?
5
Solution 1: Encryption
6
Solution II: Secret Sharing
7
Can we still search the data?
8
A Decentralized Alternative
9
Rest of Talk
10
MPC is more general than it may seem
11
How much do we earn?
12
A better way?
13
A security concern
14
Resisting collusions
15
From Theory to Practice?
16
Landscape of Definitions
17
From Truth-Tables to Circuits
18
Features of Circuit-Based Protocol
19
Dealer-free MPC for f(x,y,z)
20
The "BGW" protocol
21
Yao's Protocol
22
Dealing with active adversary
23
In hardware we trust?
24
Open Questions: Feasibility
25
Open Questions: Communication
26
Open Questions: Computation
Description:
Explore secure multiparty computation in this Richard M. Karp Distinguished Lecture by Yuval Ishai from Technion Israel Institute of Technology. Delve into the challenges of storing and protecting important data in the digital age, examining solutions like encryption and secret sharing. Investigate the concept of decentralized alternatives and their potential for maintaining confidentiality while allowing data searches. Analyze the broader applications of multiparty computation, including income comparison scenarios and security concerns related to collusion. Examine the landscape of definitions, circuit-based protocols, and specific implementations like the BGW protocol and Yao's Protocol. Consider the challenges of active adversaries and hardware-based trust. Conclude by exploring open questions in feasibility, communication, and computation within the field of secure multiparty computation.

Secure Multiparty Computation

Simons Institute
Add to list