Week 1: Secure Computation: motivation and real-world examples, various dimensions, recalling relevant topics from abstract algebra (groups, rings, fields) and cryptography
Week 2: Secret sharing (motivation, definition and applications), Shamir secret-sharing, additive secret-sharing, replicated secret-sharing
Week 3: Linear secret-sharing, general secret-sharing, secure message transmission (SMT)
Week 4: BenOr-Goldwasser-Wigderson (BGW) protocol: security proof and detailed analysis
Week 5: Degree-Reduction problem and various solutions, efficient protocols for evaluating multiplication gates, MPC in the pre-processing model
Week 6: Perfectly-secure MPC tolerating general adversaries, perfectly-secure MPC for small number of parties (the case of secure 3PC)
Week 7: Goldreich-Micali-Wigderson (GMW) protocol: security proof and detailed analysis, Oblivious transfer (OT)
Week 8: Construction of OT protocols from various cryptographic assumptions, GMW protocol in the pre-processing model
Week 9: OT extension, Yao’s protocol for secure 2-party computation
Week 10: Various optimizations of Yao’s 2PC protocol
Week 11: Mixed-world MPC protocols: The case of 2 PC
Week 12: Mixed-world 2PC protocols in the ABY framework
DOWNLOAD APP
FOLLOW US