CS 276 – Cryptography March 8 , 2016 Lecture 15 : MPC in the head
نویسندگان
چکیده
Zero knowledge proofs are one of the most used fundamental building blocks in Cryptography. Recall that zero knowledge proofs allow a prover to prove to a verifier about the veracity of a statement without revealing anything beyond the assertion. Zero knowledge proofs have notably found several applications in the area of secure multiparty computation. Secure multiparty computation allows a set of n mutually distrusting parties to compute a joint function of their private inputs. The security guarantee is that any algorithm that corrupts even all but one of the n parties cannot learn anything about the input of the uncorrupted parties beyond what it can learn from the function output. The security of MPC comes in different flavors depending on “how” the parties are corrupted. If the corruption algorithm follows the protocol description but may try to learn arbitrary information from the protocol transcripts then we call it as the semi-honest setting. On the other hand, if the corruption algorithm can deviate arbitrarily from the protocol description then we term it as malicious setting. Notice that malicious MPC even for the case of two parties directly implies Zero Knowledge protocol. 1 In 2007, Ishai, Kushilevitz, Ostrovsky and Sahai proved a surprising result that even semi-honest MPC is sufficient to obtain Zero Knowledge proofs. Additionally the Zero Knowledge protocol obtained as a result of their transformation has some “nice” properties like low communication complexity.
منابع مشابه
Cs 276 – Cryptography Lecture 3,4: Multiparty Computation Rounds Independent of Circuit Depth
Last time we considered the GMW protocol, which gives us an algorithm for securely evaluating any circuit C (x1, x2, ..., xn) where each party pi, i ∈ {1...n} has a part of the input xi. One issue with this protocol is that it may take a very large number of rounds, dependent on the depth of the circuit, because each gate must be evaluated in a topological order. Let’s consider some ideas to fi...
متن کاملMath 140a: Foundations of Real Analysis I
1. Ordered Sets, Ordered Fields, and Completeness 1 1.1. Lecture 1: January 5, 2016 1 1.2. Lecture 2: January 7, 2016 4 1.3. Lecture 3: January 11, 2016 7 1.4. Lecture 4: January 14, 2014 9 2. Sequences and Limits 13 2.1. Lecture 5: January 19, 2016 13 2.2. Lecture 6: January 21, 2016 15 2.3. Lecture 7: January 26, 2016 18 2.4. Lecture 8: January 28, 2016 21 3. Extensions of R: the Extended Rea...
متن کاملComparing the Effects of Lecture and Work in Small Groups on Learning of Head and Neck Osteology in Medical Students
Introduction: Traditional teaching methods cannot keep up with the new knowledge in medical students anymore. There are several challenges between traditional and new teaching methods in different courses .This study has tried to compare the effects of two teaching approaches on education of osteology( lecture VS work in small groups). Methods: In a quasi experimental study, 54 medical stude...
متن کامل