Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn about oblivious computation and its critical role in protecting data access patterns in this DEF CON 33 cryptocurrency weekend keynote presentation. Discover how traditional encrypted databases fail to hide data access patterns, which can leak sensitive information in applications like contact discovery, blockchains, and large language models. Explore the fundamentals of oblivious computation and understand how to construct simple yet provably secure algorithms for oblivious systems. Examine real-world applications of oblivious computation technology, including its implementation in Signal's privacy features and Ethereum's intended use cases, while gaining insights into how this technology addresses privacy vulnerabilities in modern cryptographic systems.
Syllabus
DEF CON 33 - Cryptocurrency Weekend Keynote Chelsea Button, Alfonso Tinoco & Elaine Shi
Taught by
DEFCONConference