Cryptography is a powerful tool that can be used to protect information. In its original form, cryptography enables Alice to communicate with Bob in such a way that the no evil third party Eve can learn or modify the content of their conversation.
But nowadays a lot of communication is between parties that do not know and do not trust each other, and that potentially have conflicting interests. Thus, we also need to protect users from the parties they communicate with. In other words, it is typically unclear who is "good" and who is "evil". A clear example of this is the rise of cloud storage and cloud computing, where store their data and rent computing power from potentially untrusted service providers.
In this talk I will give an overview of the cryptographic tools and techniques that allow (at least from a theoretical point of view) to secure any interactive computation, including some of my own contribution.