Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Oblivious Computation - Privacy-Preserving Algorithms for Encrypted Databases and Blockchain Applications

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn about oblivious computation and its critical role in protecting data access patterns in this DEF CON 33 cryptocurrency weekend keynote presentation. Discover how traditional encrypted databases fail to hide data access patterns, which can leak sensitive information in applications like contact discovery, blockchains, and large language models. Explore the fundamentals of oblivious computation and understand how to construct simple yet provably secure algorithms for oblivious systems. Examine real-world applications of oblivious computation technology, including its implementation in Signal's privacy features and Ethereum's intended use cases, while gaining insights into how this technology addresses privacy vulnerabilities in modern cryptographic systems.

Syllabus

DEF CON 33 - Cryptocurrency Weekend Keynote Chelsea Button, Alfonso Tinoco & Elaine Shi

Taught by

DEFCONConference

Reviews

Start your review of Oblivious Computation - Privacy-Preserving Algorithms for Encrypted Databases and Blockchain Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.