Secure Multi-Party Computation 2017

These resources are password protected!

This course is produced by FSI. Please contact forum administrators

Detailed information

Most recent entry on 2017-07-20 

Faculty

Lehrstuhl für Informatik 13 (Angewandte Kryptographie)

Recording type

Vorlesungsreihe

Via

Passwort

Language

English

Secure two-party computation is motivated by Yao's millionaires problem: suppose that two millionaires would like to know who is richter without revealing their own wealth. This idea can be formulated more general: Consider Alice has private input x and Bob has input y and they wish to compute the function f(x,y) securely. This lecture gives a comprehensive introduction to secure two and multi-party computation. We will cover the following topics:

  • Security definition of secure two and multi-party computation

  • Yao's garbled circuit

  • Optimizations for Yao's garbled circuit

  • General transformations for malicious security

  • Applications of secure two- and multi-party computation

  • Selected state-of-the-art results

Lernziele und Kompetenzen:

 

Verstehen
Die Studierende verstehen die verschiedenen Sicherheitsdefinitionen und grundlegenden Protokolle.
Analysieren
Die Studierende können die Sicherheit der Protokolle analysieren.
Evaluieren (Beurteilen)
Die Studierende können die Eigenschaften der Protokolle vergleichen und je nach Anwendung das passende Protokoll auswählen.

Associated Clips

Episode
Title
Lecturer
Updated
Via
Duration
Media
1
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-04-27
Passwort
01:34:00
2
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-05-04
Passwort
01:30:26
3
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-05-11
Passwort
01:32:34
4
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-05-18
Passwort
01:35:50
5
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-06-01
Passwort
01:36:08
6
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-06-08
Passwort
01:28:56
7
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-06-22
Passwort
01:28:53
8
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-06-29
Passwort
01:28:34
9
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-07-06
Passwort
01:08:12
10
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-07-13
Passwort
01:38:52
11
Secure Multi-Party Computation
Prof. Dr. Dominique Schröder
2017-07-20
Passwort
01:20:13

More courses from Prof. Dr. Dominique Schröder

Schröder, Dominique
Prof. Dr. Dominique Schröder
2017-07-20
Passwort
Schröder, Dominique
Prof. Dr. Dominique Schröder
2019-02-06
IdM-login
Schröder, Dominique
Prof. Dr. Dominique Schröder
2019-07-17
IdM-login
Schröder, Dominique
Prof. Dr. Dominique Schröder
2019-07-17
IdM-login
Neue IT-Techniken
Prof. Dr. Dominique Schröder
2018-11-15
Free

More courses in this category "Business"

Voigt, Kai-Ingo
Prof. Dr. Kai-Ingo Voigt
2014-07-09
Studon
Voigt, Kai-Ingo
Prof. Dr. Kai-Ingo Voigt
2012-02-08
Studon
Voigt, Kai-Ingo
Prof. Dr. Kai-Ingo Voigt
2019-01-30
IdM-login
Voigt, Kai-Ingo
Prof. Dr. Kai-Ingo Voigt
2017-07-26
Studon