-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
5 changed files
with
30 additions
and
35 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,19 +1,17 @@ | ||
#import "preamble.typ":* | ||
|
||
= 2PC Takeaways | ||
|
||
#green[ | ||
1. A _garbled circuit_ allows Alice and Bob to jointly compute some | ||
function over their respective secret inputs. We can think of this | ||
#takeaway[2PC Takeaways][ | ||
1. A _garbled circuit_ allows Alice and Bob to jointly compute some | ||
function over their respective secret inputs. We can think of this | ||
as your prototypical _2PC_ (two-party computation). | ||
2. The main ingredient of a garbled circuit is _garbled gates_, | ||
which area gates whose functionality is hidden. This can be done | ||
by Alice precomputing different outputs of the garbled circuit | ||
2. The main ingredient of a garbled circuit is _garbled gates_, | ||
which area gates whose functionality is hidden. This can be done | ||
by Alice precomputing different outputs of the garbled circuit | ||
based on all possible inputs of Bob, and then letting Bob pick one. | ||
3. Bob "picks an input" with the technique of _oblivious transfer (OT)_. | ||
This can be built in various ways, including with commutative | ||
3. Bob "picks an input" with the technique of _oblivious transfer (OT)_. | ||
This can be built in various ways, including with commutative | ||
encryption or public-key cryptography. | ||
4. More generally, it is also possible for a group of people to | ||
compute whatever secret function they want, which is the field of | ||
compute whatever secret function they want, which is the field of | ||
_multiparty computation (MPC)_. | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,9 @@ | ||
#import "preamble.typ":* | ||
|
||
= FHE Takeaways | ||
|
||
#green[ | ||
#takeaway[FHE Takeaways][ | ||
1. A _fully homomorphic encryption_ protocol allows Bob to compute some function $f(x)$ for Alice in a way that Bob doesn't get to know $x$ or $f(x)$. | ||
2. The hard problem backing known FHE protocols is the _learning with errors (LWE)_ problem, which comes down to deciding if a system of "approximate equations" over $F_q$ is consistent. | ||
3. The main idea of this approach to FHEs is to use "approximate eigenvalues" as the encrypted computation and an "approximate eigenvector" as the secret key. | ||
3. The main idea of this approach to FHEs is to use "approximate eigenvalues" as the encrypted computation and an "approximate eigenvector" as the secret key. | ||
Intuitively, adding and multiplying two matrices with different approximate eigenvalues for the same eigenvector approximately adds and multiplies the eigenvalues, respectively. | ||
4. To carefully do this, we actually need to control the error blowup with the _flatten_ operation. This creates a _leveled FHE_ protocol. | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters