PPT-MiniLEGO : Efficient Secure Two-Party Computation From General Assumptions
Author : danika-pritchard | Published Date : 2018-10-28
Tore Frederiksen Thomas Jakobsen Jesper Nielsen Peter Nordholt Claudio Orlandi 27082016 The LEGO Approach for Maliciously Secure TwoParty Computation 1 What
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "MiniLEGO : Efficient Secure Two-Party Co..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
MiniLEGO : Efficient Secure Two-Party Computation From General Assumptions: Transcript
Tore Frederiksen Thomas Jakobsen Jesper Nielsen Peter Nordholt Claudio Orlandi 27082016 The LEGO Approach for Maliciously Secure TwoParty Computation 1 What we will present. Michal . Kouck. ý. Charles University. Based on joint work with: . H. . Buhrman. , R. Cleve, . B. . Loff. , F. . Speelman. , …. Space hierarchy. space . S. space . S’. Mike Stannett, University of Sheffield (m.stannett@dcs.shef.ac.uk). New Worlds of Computation, LIFO, . Orléans. , 23 May 2011. Outline of talk. Cosmological computation (what is it?). First-order relativity theories (Andréka et al.). (Lecture 1). Arpita. . Patra. Welcome to an exciting Journey . . >> . Course Homepage. : . http://. drona.csa.iisc.ernet.in. /~. arpita. /SecureComputation15. .html . >> References:. Project Review 12 July 2013. Projects. Modelling. . dragonfly attention switching. Dendritic auditory processing. Processing images . with . spikes. Dendritic . computation with . memristors. . Computation in RATSLAM. Computers in a weird universe. Patrick Rall. Ph70. May 10, 2016. Advertising. “I laughed, I cried, I fell off my chair - and I was just reading the chapter on computational complexity … How is it possible for a serious book … to be so ridiculously entertaining?”. Secure . Computation. Chongwon Cho. . (HRL Laboratories). Sanjam. . Garg. (IBM T.J. Watson). . Rafail. . Ostrovsky. (UCLA). 2. Secure . Computation [Yao, GMW]. Alice and Bob. Alice holds input . Secure Multi-Party Computation. Debayan Gupta. Yale University. May 11, 2016. Jai . Dadabhai. The Apparent Paradox of . Modern Cryptography. Intuitive ideas of secrecy. Encrypted data are safe; but they appear to be unusable. When you hear the word “values,” what does it mean to you?. Most people often call up a list of qualities or ideals that many of us highly regard.. Some might be friendship, loyalty, safety, freedom, friendship, and honesty.. . Kartik . Nayak. With Xiao . Shaun . Wang, . Stratis. Ioannidis, Udi . Weinsberg. , Nina Taft, Elaine Shi. 1. 2. Users. Data. Data. Privacy concern!. Data Mining Engine. Data Model. Data Mining on User Data. Secure Multi-Party Computation. Debayan Gupta. Yale University. May 11, 2016. Jai . Dadabhai. The Apparent Paradox of . Modern Cryptography. Intuitive ideas of secrecy. Encrypted data are safe; but they appear to be unusable. Prediction markets & real-world data feeds. Assertions about the outside world . Idea. : add a mechanism to assert facts. election outcomes. sports results. commodity prices. Bet or hedge results using smart contracts. Prediction markets & real-world data feeds. Assertions about the outside world . Idea. : add a mechanism to assert facts. election outcomes. sports results. commodity prices. Bet or hedge results using smart contracts. EU Office/. IdeaSquare. CERN. … yes, but how?. The most difficult to achieve is to…. Challenge Assumptions. Generate new possibilities. A useful technique. LATERAL . THINKING . is . a method of thinking concerned with changing concepts and perception. . Arpita. . Patra. Recap . >Three orthogonal problems- (. n,t. )-sharing, reconstruction, multiplication protocol. > Verifiable Secret Sharing (VSS) will take care first two problems. >> .
Download Document
Here is the link to download the presentation.
"MiniLEGO : Efficient Secure Two-Party Computation From General Assumptions"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents