NPTEL : NOC:Secure Computation: Part I (Computer Science and Engineering)

Co-ordinators : Prof. Ashish Choudhury


Lecture 1 - What is Secure MPC

Lecture 2 - Real-World Examples of Secure MPC

Lecture 3 - Various Dimensions to Study Secure MPC

Lecture 4 - Recap of Basic Concepts from Abstract Algebra

Lecture 5 - Recap of Basic Concepts from Abstract Algebra (Continued...)

Lecture 6 - Recap of Basic Concepts from Cryptography

Lecture 7 - Secret sharing

Lecture 8 - Additive Secret Sharing

Lecture 9 - Inefficient Threshold Secret Sharing

Lecture 10 - Polynomials Over Fields

Lecture 11 - Shamir Secret-Sharing

Lecture 12 - Linear secret-sharing

Lecture 13 - Linear Secret Sharing (Continued...)

Lecture 14 - General Secret Sharing

Lecture 15 - Perfectly-Secure Message Transmission

Lecture 16 - A Toy MPC Protocol

Lecture 17 - A Toy MPC Protocol (Continued...)

Lecture 18 - A Toy MPC Protocol (Continued...)

Lecture 19 - The BGW MPC Protocol

Lecture 20 - The BGW MPC Protocol for Linear Functions

Lecture 21 - The BGW MPC Protocol for Linear Functions: Security Analysis

Lecture 22 - The BGW MPC Protocol: The Case of Non-Linear Gates

Lecture 23 - The Degree-Reduction Problem

Lecture 24 - The Gennaro-Rabin-Rabin (GRR) Degree-Reduction Method

Lecture 25 - Analysis of the GRR, Degree-Reduction Method

Lecture 26 - Shared Circuit-Evaluation via GRR Degree-Reduction Method

Lecture 27 - Shared Circuit-Evaluation in the Pre-processing Model

Lecture 28 - Optimality of Corruption Bound for Perfectly-Secure MPC

Lecture 29 - Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries

Lecture 30 - Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) Condition

Lecture 31 - Perfectly-Secure MPC for Small Number of Parties

Lecture 32 - Perfectly-Secure 3PC (Continued...)

Lecture 33 - More Efficient Perfectly-Secure 3PC

Lecture 34 - More Efficient Perfectly-Secure 3PC (Continued...)

Lecture 35 - Towards Cryptographically-Secure MPC

Lecture 36 - GMW MPC protocol

Lecture 37 - Oblivious Transfer (OT)

Lecture 38 - RSA Assumption and RSA Hard-Core Predicate

Lecture 39 - Bit OT Based on RSA Assumption and Hard-Core Predicate

Lecture 40 - Discrete Logarithm and DDH Assumption

Lecture 41 - OT Based on the DDH Assumption

Lecture 42 - Pre-Processing Phase for the GMW Protocol

Lecture 43 - Pre-Processing Phase for the GMW Protocol: The n-Party Case

Lecture 44 - Pre-Processing Phase for the GMW Protocol (Continued...)

Lecture 45 - Pre-Processing of OT

Lecture 46 - OT Extension

Lecture 47 - Analysis of IKNP OT Extension

Lecture 48 - Yao’s Protocol for Secure 2PC

Lecture 49 - Yao’s Garbling Scheme

Lecture 50 - Yao’s Protocol for Secure 2PC

Lecture 51 - Optimizations for Yao’s Garbling

Lecture 52 - Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based Protocol

Lecture 53 - Mixed Protocols for Secure 2PC

Lecture 54 - The Arithmetic, Boolean and Yao Sharing for Secure 2PC

Lecture 55 - The ABY Conversions

Lecture 56 - The ABY Conversions (Continued...)

Lecture 57 - The ABY Conversions (Continued...)

Lecture 58 - ABY Computations : Example

Lecture 59 - Goodbye and Farewell