{"id":182124,"date":"2009-02-11T00:00:00","date_gmt":"2009-10-31T09:23:01","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/msr-research-item\/towards-more-practical-secure-computation-efficient-protocols-for-secure-linear-algebra\/"},"modified":"2018-07-19T08:27:26","modified_gmt":"2018-07-19T15:27:26","slug":"towards-more-practical-secure-computation-efficient-protocols-for-secure-linear-algebra","status":"publish","type":"msr-video","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/video\/towards-more-practical-secure-computation-efficient-protocols-for-secure-linear-algebra\/","title":{"rendered":"Towards more Practical Secure Computation: Efficient Protocols for Secure Linear Algebra"},"content":{"rendered":"<div class=\"asset-content\">\n<p>&#8220;Secure Computation&#8221; has been a classic and central question in modern cryptography with a large set of potential applications.<br \/>\nMining large genomic databases, private scientific computation, and studying properties of shared networks are just a few examples.<br \/>\nUnfortunately, the majority of the constructions in this area have not made their way into practice, primarily due to their inefficiency.<\/p>\n<p>In this talk, I first outline three different approaches toward designing more practical protocols, and briefly describe some of our results in each direction. I will then focus on one approach and the problem of &#8220;Secure Linear Algebra&#8221;. In a distributed system, linear constraints might reveal sensitive information and therefore, the involved parties want to reveal as little information as possible about their private inputs. I consider this problem in multiple distributed settings and adversarial environments. In each case, I will describe protocols that are nearly optimal in terms of round, computation, and communication efficiency.<\/p>\n<\/div>\n<p><!-- .asset-content --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Secure Computation&#8221; has been a classic and central question in modern cryptography with a large set of potential applications. Mining large genomic databases, private scientific computation, and studying properties of shared networks are just a few examples. Unfortunately, the majority of the constructions in this area have not made their way into practice, primarily due [&hellip;]<\/p>\n","protected":false},"featured_media":194466,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-182124","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/Hs-7ixoSqAA","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/182124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/182124\/revisions"}],"predecessor-version":[{"id":496127,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/182124\/revisions\/496127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media\/194466"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=182124"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=182124"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=182124"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=182124"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=182124"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=182124"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=182124"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=182124"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=182124"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=182124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}