Secure Computation and Its Diverse Applications
- Yuval IshaiAffiliated withTechnion and UCLA
Secure multiparty computation (MPC) allows two or more parties to perform a joint distributed computation without revealing their secrets to each other. While MPC has traditionally been viewed as an ends rather than a means, in recent years we have seen a growing number of unexpected applications of MPC and connections with problems from other domains.
In this talk we will survey several of these connections and highlight some research directions which they motivate. In particular, we will discuss the following connections:
MPC and locally decodable codes. How can the secrecy property of MPC protocols be useful for reliable and efficient access to data?
MPC and the parallel complexity of cryptography. How can progress on the round complexity of MPC lead to better parallel implementations of one-way functions and other cryptographic primitives?
MPC and private circuits. How can MPC be used to protect cryptographic hardware against side-channel attacks?
MPC in the head. How can MPC protocols which assume an honest majority be useful in the context of two-party cryptography?
- Secure Computation and Its Diverse Applications
- Book Title
- Theory of Cryptography
- Book Subtitle
- 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
- p 90
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.