Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Lec 01 What is Secure MPC | Download |
2 | Lec 02 Real-World Examples of Secure MPC | Download |
3 | Lec 03 Various Dimensions to Study Secure MPC | Download |
4 | Lec 04 Recap of Basic Concepts from Abstract Algebra | Download |
5 | Lec 05 Recap of Basic Concepts from Abstract Algebra Contd. | Download |
6 | Lec 06 Recap of Basic Concepts from Cryptography | Download |
7 | Lec 07 Secret sharing | Download |
8 | Lec 08 Additive Secret Sharing | Download |
9 | Lec 09 Inefficient Threshold Secret Sharing | Download |
10 | Lec 10 Polynomials Over Fields | Download |
11 | Lec 11 Shamir Secret-Sharing | Download |
12 | Lec 12 Linear secret-sharing | Download |
13 | Lec 13 Linear Secret Sharing Contd. | Download |
14 | Lec 14 General Secret Sharing | Download |
15 | Lec 15 Perfectly-Secure Message Transmission | Download |
16 | Lec 16 A Toy MPC Protocol | Download |
17 | Lec 17 A Toy MPC Protocol Contd. | Download |
18 | Lec 18 A Toy MPC Protocol Contd. | Download |
19 | Lec 19 The BGW MPC Protocol | Download |
20 | Lec 20 The BGW MPC Protocol for Linear Functions | Download |
21 | Lec 21 The BGW MPC Protocol for Linear Functions: Security Analysis | Download |
22 | Lec 22 The BGW MPC Protocol: The Case of Non-Linear Gates | Download |
23 | Lec 23 The Degree-Reduction Problem | Download |
24 | Lec 24 The Gennaro-Rabin-Rabin (GRR) Degree-Reduction Method | Download |
25 | Lec 25 Analysis of the GRR, Degree-Reduction Method | Download |
26 | Lec 26 Shared Circuit-Evaluation via GRR Degree-Reduction Method | Download |
27 | Lec 27 Shared Circuit-Evaluation in the Pre-processing Model | Download |
28 | Lec 28 Optimality of Corruption Bound for Perfectly-Secure MPC | Download |
29 | Lec 29 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries | Download |
30 | Lec 30 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) Condition | Download |
31 | Lec 31 Perfectly-Secure MPC for Small Number of Parties | Download |
32 | Lec 32 Perfectly-Secure 3PC Contd. | Download |
33 | Lec 33 More Efficient Perfectly-Secure 3PC | Download |
34 | Lec 34 More Efficient Perfectly-Secure 3PC Contd. | Download |
35 | Lec 35 Towards Cryptographically-Secure MPC | Download |
36 | Lec 36 GMW MPC protocol | Download |
37 | Lec 37 Oblivious Transfer (OT) | Download |
38 | Lec 38 RSA Assumption and RSA Hard-Core Predicate | Download |
39 | Lec 39 Bit OT Based on RSA Assumption and Hard-Core Predicate | Download |
40 | Lec 40 Discrete Logarithm and DDH Assumption | Download |
41 | Lec 41 OT Based on the DDH Assumption | Download |
42 | Lec 42 Pre-Processing Phase for the GMW Protocol | Download |
43 | Lec 43 Pre-Processing Phase for the GMW Protocol: The n-Party Case | Download |
44 | Lec 44 Pre-Processing Phase for the GMW Protocol Contd. | Download |
45 | Lec 45 Pre-Processing of OT | Download |
46 | Lec 46 OT Extension | Download |
47 | Lec 47 Analysis of IKNP OT Extension | Download |
48 | Lec 48 Yao’s Protocol for Secure 2PC | Download |
49 | Lec 49 Yao’s Garbling Scheme | Download |
50 | Lec 50 Yao’s Protocol for Secure 2PC | Download |
51 | Lec 51 Optimizations for Yao’s Garbling | Download |
52 | Lec 52 Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based Protocol | Download |
53 | Lec 53 Mixed Protocols for Secure 2PC | Download |
54 | Lec 54 The Arithmetic, Boolean and Yao Sharing for Secure 2PC | Download |
55 | Lec 55 The ABY Conversions | Download |
56 | Lec 56 The ABY Conversions Contd. | Download |
57 | Lec 57 The ABY Conversions Contd. | Download |
58 | Lec 58 ABY Computations : Example | Download |
59 | Lec 59 Goodbye and Farewell | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Lec 01 What is Secure MPC | Download Verified |
2 | Lec 02 Real-World Examples of Secure MPC | Download Verified |
3 | Lec 03 Various Dimensions to Study Secure MPC | Download Verified |
4 | Lec 04 Recap of Basic Concepts from Abstract Algebra | Download Verified |
5 | Lec 05 Recap of Basic Concepts from Abstract Algebra Contd. | Download Verified |
6 | Lec 06 Recap of Basic Concepts from Cryptography | Download Verified |
7 | Lec 07 Secret sharing | Download Verified |
8 | Lec 08 Additive Secret Sharing | Download Verified |
9 | Lec 09 Inefficient Threshold Secret Sharing | Download Verified |
10 | Lec 10 Polynomials Over Fields | Download Verified |
11 | Lec 11 Shamir Secret-Sharing | Download Verified |
12 | Lec 12 Linear secret-sharing | Download Verified |
13 | Lec 13 Linear Secret Sharing Contd. | Download Verified |
14 | Lec 14 General Secret Sharing | Download Verified |
15 | Lec 15 Perfectly-Secure Message Transmission | Download Verified |
16 | Lec 16 A Toy MPC Protocol | Download Verified |
17 | Lec 17 A Toy MPC Protocol Contd. | Download Verified |
18 | Lec 18 A Toy MPC Protocol Contd. | Download Verified |
19 | Lec 19 The BGW MPC Protocol | Download Verified |
20 | Lec 20 The BGW MPC Protocol for Linear Functions | Download Verified |
21 | Lec 21 The BGW MPC Protocol for Linear Functions: Security Analysis | Download Verified |
22 | Lec 22 The BGW MPC Protocol: The Case of Non-Linear Gates | Download Verified |
23 | Lec 23 The Degree-Reduction Problem | Download Verified |
24 | Lec 24 The Gennaro-Rabin-Rabin (GRR) Degree-Reduction Method | Download Verified |
25 | Lec 25 Analysis of the GRR, Degree-Reduction Method | Download Verified |
26 | Lec 26 Shared Circuit-Evaluation via GRR Degree-Reduction Method | Download Verified |
27 | Lec 27 Shared Circuit-Evaluation in the Pre-processing Model | Download Verified |
28 | Lec 28 Optimality of Corruption Bound for Perfectly-Secure MPC | Download Verified |
29 | Lec 29 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries | Download Verified |
30 | Lec 30 Perfectly-Secure MPC Tolerating General (Non-Threshold) Adversaries with Q^((2)) Condition | Download Verified |
31 | Lec 31 Perfectly-Secure MPC for Small Number of Parties | Download Verified |
32 | Lec 32 Perfectly-Secure 3PC Contd. | Download Verified |
33 | Lec 33 More Efficient Perfectly-Secure 3PC | Download Verified |
34 | Lec 34 More Efficient Perfectly-Secure 3PC Contd. | Download Verified |
35 | Lec 35 Towards Cryptographically-Secure MPC | Download Verified |
36 | Lec 36 GMW MPC protocol | Download Verified |
37 | Lec 37 Oblivious Transfer (OT) | Download Verified |
38 | Lec 38 RSA Assumption and RSA Hard-Core Predicate | Download Verified |
39 | Lec 39 Bit OT Based on RSA Assumption and Hard-Core Predicate | Download Verified |
40 | Lec 40 Discrete Logarithm and DDH Assumption | Download Verified |
41 | Lec 41 OT Based on the DDH Assumption | Download Verified |
42 | Lec 42 Pre-Processing Phase for the GMW Protocol | Download Verified |
43 | Lec 43 Pre-Processing Phase for the GMW Protocol: The n-Party Case | Download Verified |
44 | Lec 44 Pre-Processing Phase for the GMW Protocol Contd. | Download Verified |
45 | Lec 45 Pre-Processing of OT | Download Verified |
46 | Lec 46 OT Extension | Download Verified |
47 | Lec 47 Analysis of IKNP OT Extension | Download Verified |
48 | Lec 48 Yao’s Protocol for Secure 2PC | Download Verified |
49 | Lec 49 Yao’s Garbling Scheme | Download Verified |
50 | Lec 50 Yao’s Protocol for Secure 2PC | Download Verified |
51 | Lec 51 Optimizations for Yao’s Garbling | Download Verified |
52 | Lec 52 Interpreting Yao’s Secure 2PC Protocol as a Secret-Sharing Based Protocol | Download Verified |
53 | Lec 53 Mixed Protocols for Secure 2PC | Download Verified |
54 | Lec 54 The Arithmetic, Boolean and Yao Sharing for Secure 2PC | Download Verified |
55 | Lec 55 The ABY Conversions | Download Verified |
56 | Lec 56 The ABY Conversions Contd. | Download Verified |
57 | Lec 57 The ABY Conversions Contd. | Download Verified |
58 | Lec 58 ABY Computations : Example | Download Verified |
59 | Lec 59 Goodbye and Farewell | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Not Available |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |