Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture discusses the Danish Sugar Beets Auction as a historic example, where 5000 farmers needed a market to trade production rights. It explores the role of an auctioneer, proposing a cryptographic protocol for secure computation. The lecture introduces the theoretical framework of Secure Multiparty Computation (SMC), illustrating the concept with examples like SecureSum. It delves into the design of secure protocols, emphasizing the importance of a clear security definition. The lecture compares the real and ideal worlds in terms of security, highlighting the need for a better security definition. It explains the generalized security definition and the real/ideal simulation paradigm for proving security. The lecture concludes by exploring the network model, adversarial model, and security guarantees in the context of secure computation.