Monday April 21st, 2003
B17 Upson Hall
NEC Research Labs
Conventional cryptography provides strongboxes for our secrets. However, information often must be combined with other information to be useful, and to do that we have to take it out of hiding. Or do we?
For the last two decades, researchers have developed the field of secure computation, in which secrets are combined while minimizing as much as possible the information leaked. I will survey the basics of secure computation and discuss some of my own work on this subject.