Modules / Lectures


Sl.No Chapter Name MP4 Download
1Lec 01 What is Secure MPCDownload
2Lec 02 Real-World Examples of Secure MPCDownload
3Lec 03 Various Dimensions to Study Secure MPCDownload
4Lec 04 Recap of Basic Concepts from Abstract AlgebraDownload
5Lec 05 Recap of Basic Concepts from Abstract Algebra Contd.Download
6Lec 06 Recap of Basic Concepts from CryptographyDownload
7Lec 07 Secret sharingDownload
8Lec 08 Additive Secret SharingDownload
9Lec 09 Inefficient Threshold Secret SharingDownload
10Lec 10 Polynomials Over FieldsDownload
11Lec 11 Shamir Secret-SharingDownload
12Lec 12 Linear secret-sharingDownload
13Lec 13 Linear Secret Sharing Contd.Download
14Lec 14 General Secret SharingDownload
15Lec 15 Perfectly-Secure Message TransmissionDownload
16Lec 16 A Toy MPC ProtocolDownload
17Lec 17 A Toy MPC Protocol Contd.Download
18Lec 18 A Toy MPC Protocol Contd.Download
19Lec 19 The BGW MPC ProtocolDownload
20Lec 20 The BGW MPC Protocol for Linear FunctionsDownload
21Lec 21 The BGW MPC Protocol for Linear Functions: Security AnalysisDownload
22Lec 22 The BGW MPC Protocol: The Case of Non-Linear GatesDownload
23Lec 23 The Degree-Reduction ProblemDownload
24Lec 24 The Gennaro-Rabin-Rabin (GRR) Degree-Reduction MethodDownload
25Lec 25 Analysis of the GRR, Degree-Reduction MethodDownload
26Lec 26 Shared Circuit-Evaluation via GRR Degree-Reduction MethodDownload
27Lec 27 Shared Circuit-Evaluation in the Pre-processing ModelDownload
28Lec 28 Optimality of Corruption Bound for Perfectly-Secure MPCDownload
29Lec 29 Perfectly-Secure MPC Tolerating General (Non-Threshold) AdversariesDownload
30Lec 30 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) ConditionDownload
31Lec 31 Perfectly-Secure MPC for Small Number of PartiesDownload
32Lec 32 Perfectly-Secure 3PC Contd.Download
33Lec 33 More Efficient Perfectly-Secure 3PCDownload
34Lec 34 More Efficient Perfectly-Secure 3PC Contd.Download
35Lec 35 Towards Cryptographically-Secure MPCDownload
36Lec 36 GMW MPC protocolDownload
37Lec 37 Oblivious Transfer (OT)Download
38Lec 38 RSA Assumption and RSA Hard-Core PredicateDownload
39Lec 39 Bit OT Based on RSA Assumption and Hard-Core PredicateDownload
40Lec 40 Discrete Logarithm and DDH AssumptionDownload
41Lec 41 OT Based on the DDH AssumptionDownload
42Lec 42 Pre-Processing Phase for the GMW ProtocolDownload
43Lec 43 Pre-Processing Phase for the GMW Protocol: The n-Party CaseDownload
44Lec 44 Pre-Processing Phase for the GMW Protocol Contd.Download
45Lec 45 Pre-Processing of OTDownload
46Lec 46 OT ExtensionDownload
47Lec 47 Analysis of IKNP OT ExtensionDownload
48Lec 48 Yao’s Protocol for Secure 2PCDownload
49Lec 49 Yao’s Garbling SchemeDownload
50Lec 50 Yao’s Protocol for Secure 2PCDownload
51Lec 51 Optimizations for Yao’s GarblingDownload
52Lec 52 Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based ProtocolDownload
53Lec 53 Mixed Protocols for Secure 2PCDownload
54Lec 54 The Arithmetic, Boolean and Yao Sharing for Secure 2PCDownload
55Lec 55 The ABY ConversionsDownload
56Lec 56 The ABY Conversions Contd.Download
57Lec 57 The ABY Conversions Contd.Download
58Lec 58 ABY Computations : ExampleDownload
59Lec 59 Goodbye and FarewellDownload

Sl.No Chapter Name English
1Lec 01 What is Secure MPCDownload
Verified
2Lec 02 Real-World Examples of Secure MPCDownload
Verified
3Lec 03 Various Dimensions to Study Secure MPCDownload
Verified
4Lec 04 Recap of Basic Concepts from Abstract AlgebraDownload
Verified
5Lec 05 Recap of Basic Concepts from Abstract Algebra Contd.Download
Verified
6Lec 06 Recap of Basic Concepts from CryptographyDownload
Verified
7Lec 07 Secret sharingDownload
Verified
8Lec 08 Additive Secret SharingDownload
Verified
9Lec 09 Inefficient Threshold Secret SharingDownload
Verified
10Lec 10 Polynomials Over FieldsDownload
Verified
11Lec 11 Shamir Secret-SharingDownload
Verified
12Lec 12 Linear secret-sharingDownload
Verified
13Lec 13 Linear Secret Sharing Contd.Download
Verified
14Lec 14 General Secret SharingDownload
Verified
15Lec 15 Perfectly-Secure Message TransmissionDownload
Verified
16Lec 16 A Toy MPC ProtocolDownload
Verified
17Lec 17 A Toy MPC Protocol Contd.Download
Verified
18Lec 18 A Toy MPC Protocol Contd.Download
Verified
19Lec 19 The BGW MPC ProtocolDownload
Verified
20Lec 20 The BGW MPC Protocol for Linear FunctionsDownload
Verified
21Lec 21 The BGW MPC Protocol for Linear Functions: Security AnalysisDownload
Verified
22Lec 22 The BGW MPC Protocol: The Case of Non-Linear GatesDownload
Verified
23Lec 23 The Degree-Reduction ProblemDownload
Verified
24Lec 24 The Gennaro-Rabin-Rabin (GRR) Degree-Reduction MethodDownload
Verified
25Lec 25 Analysis of the GRR, Degree-Reduction MethodDownload
Verified
26Lec 26 Shared Circuit-Evaluation via GRR Degree-Reduction MethodDownload
Verified
27Lec 27 Shared Circuit-Evaluation in the Pre-processing ModelDownload
Verified
28Lec 28 Optimality of Corruption Bound for Perfectly-Secure MPCDownload
Verified
29Lec 29 Perfectly-Secure MPC Tolerating General (Non-Threshold) AdversariesDownload
Verified
30Lec 30 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) ConditionDownload
Verified
31Lec 31 Perfectly-Secure MPC for Small Number of PartiesDownload
Verified
32Lec 32 Perfectly-Secure 3PC Contd.Download
Verified
33Lec 33 More Efficient Perfectly-Secure 3PCDownload
Verified
34Lec 34 More Efficient Perfectly-Secure 3PC Contd.Download
Verified
35Lec 35 Towards Cryptographically-Secure MPCDownload
Verified
36Lec 36 GMW MPC protocolDownload
Verified
37Lec 37 Oblivious Transfer (OT)Download
Verified
38Lec 38 RSA Assumption and RSA Hard-Core PredicateDownload
Verified
39Lec 39 Bit OT Based on RSA Assumption and Hard-Core PredicateDownload
Verified
40Lec 40 Discrete Logarithm and DDH AssumptionDownload
Verified
41Lec 41 OT Based on the DDH AssumptionDownload
Verified
42Lec 42 Pre-Processing Phase for the GMW ProtocolDownload
Verified
43Lec 43 Pre-Processing Phase for the GMW Protocol: The n-Party CaseDownload
Verified
44Lec 44 Pre-Processing Phase for the GMW Protocol Contd.Download
Verified
45Lec 45 Pre-Processing of OTDownload
Verified
46Lec 46 OT ExtensionDownload
Verified
47Lec 47 Analysis of IKNP OT ExtensionDownload
Verified
48Lec 48 Yao’s Protocol for Secure 2PCDownload
Verified
49Lec 49 Yao’s Garbling SchemeDownload
Verified
50Lec 50 Yao’s Protocol for Secure 2PCDownload
Verified
51Lec 51 Optimizations for Yao’s GarblingDownload
Verified
52Lec 52 Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based ProtocolDownload
Verified
53Lec 53 Mixed Protocols for Secure 2PCDownload
Verified
54Lec 54 The Arithmetic, Boolean and Yao Sharing for Secure 2PCDownload
Verified
55Lec 55 The ABY ConversionsDownload
Verified
56Lec 56 The ABY Conversions Contd.Download
Verified
57Lec 57 The ABY Conversions Contd.Download
Verified
58Lec 58 ABY Computations : ExampleDownload
Verified
59Lec 59 Goodbye and FarewellDownload
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available