Secure Computation |
Instructor: Benny Pinkas, benny (at) pinkas.net.
Spring semester 2014.
This course will cover topics in secure mult-party computation.
Introduction to Cruptorgaphy.
Grading: Homeworks and a final large homework.
Homeworks:
Lecture |
Date |
Subject |
Files |
1 |
25/2/2014 | Intro to seucre computation. Oblivious transfer. |
|
2 | 4/3/2014 | Sigma protocols. | slides. |
3 | 11/3/2014 | Sigma protocols and ZK. | slides. |
4 | 18/3/2014 | Sigma protocols. Oblivious transfer. | slides. |
5 | 25/3/2014 | Oblivious transfer. | slides. |
6 | 8/4/2014 | Definitions. | slides. |
7 | 13/5/2014 | Fully secuer oblivious transfer. | slides. |
8 | 14/5/2014 | Yao's protocol. | slides. |
9 | Secure computation of the median. The GMW protocol for secure multi-party computation. | slides. | |
10 | The GMW and BMR protocol for secure multi-party computation. | slides. | |
11 | The BGW protocol for secure multi-party computation. | slides. | |
12 | Private Information Retrieval (PIR). | slides. |
Last updated: July 26, 2014.