MPCExplained
MPCExplained
  • Видео 6
  • Просмотров 8 018
MPC in the Real World
In this video, we demonstrate how MPC looks in the real world scenario
Просмотров: 802

Видео

Security and Data Privacy in MPC
Просмотров 764Год назад
So far in these videos, we've been assuming that the three people running the MPC are all honest, trustworthy people. But what if one of them wasn't honest but actually an imposter? In this video, we demonstrate that a single imposter can still not violate privacy.
How Multiplication in MPC works
Просмотров 862Год назад
In this video, we try to deep-dive into how and why multiplication works. We try to explain it using two approaches i.e. a visual approach and another using basic math. We also explain why we need masking and how it is included while doing multiplication in MPC
Introducing Multiplication in MPC
Просмотров 963Год назад
Key Learnings - It is possible to multiply two numbers, without ever learning what they are - The helper parties do not even learn the answer, as they compute a secret-sharing of the answer - Each helper just needs to do some simple addition and multiplication - There is a step called "Masking" which involves generating random numbers - At the end, each helper writes a number down and shares it...
How addition in MPC works
Просмотров 1,3 тыс.Год назад
In this video, we try to explain how addition works in MPC on a whiteboard. We use a visual approach by showing shares of numbers as line segments and adding them up
Introducing Secure Multi Party Computation (MPC)
Просмотров 3,3 тыс.Год назад
In this video, we explain what "secret-sharing" is in a simple, approachable way. We also show how you can add up secret-shared numbers. Key learnings 1. If you only have 2 out of 3 secret-shares, you learn nothing about the secret number 2. With multiparty computation (MPC) we can add up secret-numbers to find the total, without learning what they are. 3. Actually, you can compute any function...

Комментарии

  • @יניבגלבר-ב9ק
    @יניבגלבר-ב9ק 23 дня назад

    Great video

  • @ErnestXavier-v8c
    @ErnestXavier-v8c Месяц назад

    Thanks man 🙂 Thank you all

  • @user-wr4yl7tx3w
    @user-wr4yl7tx3w Месяц назад

    Brilliant!

  • @user-wr4yl7tx3w
    @user-wr4yl7tx3w Месяц назад

    Excellent content

  • @cheolhwan-j5p
    @cheolhwan-j5p 2 месяца назад

    Interesting!

  • @anilgracias
    @anilgracias 3 месяца назад

    why isn't this on some magic show? 😅

  • @mominababar5625
    @mominababar5625 4 месяца назад

    Hi. Thank you for such a clear explanation. Can you make a video explaining how to find max value using MPC i.e. the millionare's problem?

  • @shivaparsarad4356
    @shivaparsarad4356 6 месяцев назад

    How 9+8+1 will be 8!?

    • @rabianaeem1333
      @rabianaeem1333 6 месяцев назад

      thats what I wanna know too. Isn't it 18?

    • @rabianaeem1333
      @rabianaeem1333 6 месяцев назад

      Ooh I get it now they are not talking about the literal addition, they are adding them on biclock, which has only 0-9 numbers on it. 9+1=0 => 0+8=8. :)

  • @hafizjoundysyafie8184
    @hafizjoundysyafie8184 6 месяцев назад

    magic

  • @sumankumar4458
    @sumankumar4458 6 месяцев назад

    I want to know about how commuication is done in smpc?

  • @sumankumar4458
    @sumankumar4458 6 месяцев назад

    video is great

  • @ygchoi2421
    @ygchoi2421 7 месяцев назад

    what if if it's only two running the MPC??

  • @eamanor8
    @eamanor8 7 месяцев назад

    Do the parties involved in the computation have to always be 3? Can the number of parties be increased or reduced to 2?

  • @cecilechau7932
    @cecilechau7932 7 месяцев назад

    Computers communicate with each other through the internet

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      The cost of sending data across data centers is the most expensive part of MPC

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      Therefore when designing MPC protocols, we usually minimize the number of multiplication

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      Addition is almost free

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      Biclock- modulous

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      Discuss under what conditions the privacy would be preserved or compromised

  • @cecilechau7932
    @cecilechau7932 7 месяцев назад

    Masking

  • @cecilechau7932
    @cecilechau7932 7 месяцев назад

    Security, privacy. Is possible to do all kinds of computations without learning all the secret inputs

  • @codegeek98
    @codegeek98 8 месяцев назад

    This is an AMAZING series so far. Your pacing could not be better.

  • @cecilechau7932
    @cecilechau7932 9 месяцев назад

    But what if the two bad ones collaborate 😂?

    • @richathegr8
      @richathegr8 9 месяцев назад

      If that happens, the protocol will break and privacy will be violated. That's why it is important to choose the helpers carefully and impose rules such that it would be not worth it for them. Please watch the next video to learn more

    • @cecilechau7932
      @cecilechau7932 7 месяцев назад

      Honest and trustworthy people. What if not?

  • @solomondanso1034
    @solomondanso1034 10 месяцев назад

    I just found your videos, you are a genius, and make things much easier. Thanks

  • @solomondanso1034
    @solomondanso1034 10 месяцев назад

    Hey, your explanation is the best. I am a Quantum secure multi party student and I enjoyed this vide

  • @darylfunk2226
    @darylfunk2226 11 месяцев назад

    *PromoSM* 😁

  • @ouriel
    @ouriel 11 месяцев назад

    good job explaining this in a simple and fun way