top of page

Methods of Privacy-Preserving Computing

This course can no longer be booked.

This course will introduce different approaches to achieve privacy-preserving computing


Service Description

- Pillars of privacy-preserving computing - Introduction to Homomorphic Encryption - Analysis of Pros and Cons - Libraries of HE and usage examples - Introduction to Trusted Execution Environment - Analysis of Pros and Cons - Libraries of TEE and usage examples - Introduction to Secure Multi-Party Computation - Analysis of Pros and Cons - Libraries of SMPC and usage examples - Other approaches: Differential Privacy, Functional Encryption.


bottom of page