Secure Computation


 

Instructor: Benny Pinkas, benny (at) pinkas.net.

 

Spring semester 2014.

 

Description:

This course will cover topics in secure mult-party computation.

Introduction to Cruptorgaphy.

 

Grading: Homeworks and a final large homework

Homeworks:


Course Plan:

 

Lecture

Date

Subject

Files

1

25/2/2014

Intro to seucre computation. Oblivious transfer.

slides.

24/3/2014Sigma protocols.slides.
3 11/3/2014 Sigma protocols and ZK. slides.
418/3/2014Sigma protocols. Oblivious transfer.slides.
525/3/2014Oblivious transfer.slides.
68/4/2014Definitions.slides.
713/5/2014Fully secuer oblivious transfer.slides.
814/5/2014Yao's protocol.slides.
9Secure computation of the median. The GMW protocol for secure multi-party computation.slides.
10The GMW and BMR protocol for secure multi-party computation.slides.
11The BGW  protocol for secure multi-party computation.slides.
12Private Information Retrieval (PIR).slides.

 

Last updated: July 26, 2014.