Secure Multi-party Computation and the Millionaires' Problem explained

  Рет қаралды 2,283

Security and Privacy Academy

Security and Privacy Academy

Күн бұрын

Пікірлер: 14
@4amalreadyy
@4amalreadyy 3 ай бұрын
Finally a video that made me understand Yao's Millionaires Problem , Thank you. The pratical example really helped!
@the-dark-matter
@the-dark-matter 2 ай бұрын
You are a legend!
@dianaayt
@dianaayt 11 ай бұрын
is Db que thing that will desencripte the function EB(x)?
@SecPrivAca
@SecPrivAca 11 ай бұрын
Exactly, Db is the decryption function using Bob's private key.
@othercandidate7162
@othercandidate7162 8 ай бұрын
Why there is an inconsistancy in this video, you said if f(x) in Zi, alice earns more in the beginning, but the result shows f(x) + 1 in Zi, shouldn't it be Bob earns more, but you said Alice earns more?
@SecPrivAca
@SecPrivAca 8 ай бұрын
Yes, there is a mistake during the theory part of the video. The example is however correct. If f(x)+1 is in Z_i then Alice earns more (as we see in the example).
@PMA65537
@PMA65537 11 ай бұрын
Dislike music in the background.
@SecPrivAca
@SecPrivAca 11 ай бұрын
I have removed it in my later videos.
@annaszuchy1735
@annaszuchy1735 9 ай бұрын
What happens when there's equality?
@SecPrivAca
@SecPrivAca 9 ай бұрын
If Bob also earns 8, he would increase all numbers following the 9th number, i.e. 9.67 becomes 10.67 So, 8.33 would be unchanged and f(x) would be in the series. That means that Alice knows that she does NOT earn more than Bob. She does not know that he earns as much.
@ShivananChetia
@ShivananChetia 7 ай бұрын
Worst explanation
@SecPrivAca
@SecPrivAca 7 ай бұрын
what part did you find challenging to understand?
Secure Multi-party Computation - Secure Circuit Evaluation Explained
8:09
Security and Privacy Academy
Рет қаралды 274
Oblivious Transfer - Computerphile
20:15
Computerphile
Рет қаралды 54 М.
CAN YOU DO THIS ?
00:23
STORROR
Рет қаралды 41 МЛН
Когда отец одевает ребёнка @JaySharon
00:16
История одного вокалиста
Рет қаралды 16 МЛН
002 Introduction to Multiparty Computation w/ Yehuda Lindell
1:27:26
Dear Game Developers, Stop Messing This Up!
22:19
Jonas Tyroller
Рет қаралды 722 М.
Secure Multi Party Computation part 1- The BGW Protocol - Gilad Asharov
1:00:00
The BIU Research Center on Applied Cryptography and Cyber Security
Рет қаралды 3,8 М.
Why Isn't Functional Programming the Norm? - Richard Feldman
46:09
Where Does Bad Code Come From?
42:21
Molly Rocket
Рет қаралды 197 М.
k-anonymity explained
3:49
Security and Privacy Academy
Рет қаралды 15 М.
Is Bitcoin Multisig Still The Best?
17:11
Bitcoin University
Рет қаралды 20 М.
CAN YOU DO THIS ?
00:23
STORROR
Рет қаралды 41 МЛН