Return to Video

07-03 Secure Computation Solution

  • 0:00 - 0:05
    The answer is no. We're going to talk about a cryptographic protocol that does this.
  • 0:05 - 0:08
    But actually achieving what we want depends on lots of other things.
  • 0:08 - 0:10
    It depends on people.
  • 0:10 - 0:14
    It depends on assumptions about the adversary, knowing what capabilities the participants have
  • 0:14 - 0:16
    as well as any eavesdropper might have,
  • 0:16 - 0:19
    as well as building the system that actually runs the protocol.
  • 0:19 - 0:22
    These are all things we're not going to talk about.
  • 0:22 - 0:26
    What we are going to talk about is a protocol that, given the right answers
  • 0:26 -
    to these questions, could provide this property.
Title:
07-03 Secure Computation Solution
Team:
Udacity
Project:
CS387 - Applied Cryptography
Duration:
0:31
Amara Bot added a translation

English subtitles

Revisions