Главная
Study mode:
on
1
Intro
2
Secure Computation Settings
3
Adversary Models
4
A Construction Paradigm GMW
5
The IPS Compiler
6
The Basic Idea
7
Server Simulation by Clients
8
Security of Inner Protocols
9
Our Results
10
Optimizations
11
Variants
12
Concrete Efficiency
13
Number of Servers - Analysis
14
Difficulties
15
Experimental Results
16
Conclusions - IPS Efficiency
17
Summary
Description:
Explore a comprehensive analysis of the IPS compiler for secure multi-party computation in this 21-minute conference talk from Crypto 2011. Delve into optimizations, variants, and concrete efficiency of the compiler, which constructs protocols secure against malicious adversaries without an honest majority. Learn about improvements to the watchlist setup phase, a simpler variant using covert adversary protocols, and its potential for more efficient asymptotic security. Examine the compiler's concrete efficiency and its competitiveness with current efficient protocols. Gain insights into secure computation settings, adversary models, and the GMW construction paradigm as you follow the detailed syllabus covering key aspects of this innovative approach to cryptographic protocol design.

The IPS Compiler - Optimizations, Variants and Concrete Efficiency

TheIACR
Add to list