Homomorphic Encryption in the SPDZ Protocol for MPC

Homomorphic Encryption in the SPDZ Protocol for MPC

Simons Institute via YouTube Direct link

Triple generation: two main approaches

9 of 23

9 of 23

Triple generation: two main approaches

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Homomorphic Encryption in the SPDZ Protocol for MPC

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Secure Multi-Party Computation
  3. 3 The SPDZ setting
  4. 4 MPC in the preprocessing model
  5. 5 Additive secret sharing with MACS
  6. 6 Reconstructed shared values
  7. 7 SPDZ online phase : securely computing arithmetic circuits
  8. 8 Multiplication of secret-shared values
  9. 9 Triple generation: two main approaches
  10. 10 Threshold homomorphic encryption
  11. 11 Instantiating threshold homomorphic
  12. 12 Distributed decryption protocol
  13. 13 Passive triple generation: basic protocol
  14. 14 Active security in two steps
  15. 15 Zero knowledge proofs in SPDZ
  16. 16 Proving knowledge of short preimages
  17. 17 Variations on the basic SPDZ protocol
  18. 18 Where can we hope to do better?
  19. 19 Improving zero knowledge proofs
  20. 20 A step further removing zero knowledge proofs?
  21. 21 Noise drowning in distributed decryption
  22. 22 Alternative approach: non-interactive triploma generation
  23. 23 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.