Succinct Non-Interactive Secure Computation

Succinct Non-Interactive Secure Computation

TheIACR via YouTube Direct link

Intro

1 of 11

1 of 11

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Succinct Non-Interactive Secure Computation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Secure Two-Party Computation [Yao82]
  3. 3 Non-Interactive Secure Computation (NISC)
  4. 4 Achieving Malicious Security
  5. 5 Succinctness
  6. 6 Fully Homomorphic Encryption [Gen09]
  7. 7 Delegation of Computation
  8. 8 Main Question
  9. 9 Main Theorem
  10. 10 Constructing Our Protocol: Summary
  11. 11 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.