top of page
Methods of Privacy-Preserving Computing
This course can no longer be booked.
This course will introduce different approaches to achieve privacy-preserving computing
Service Description
- Pillars of privacy-preserving computing - Introduction to Homomorphic Encryption - Analysis of Pros and Cons - Libraries of HE and usage examples - Introduction to Trusted Execution Environment - Analysis of Pros and Cons - Libraries of TEE and usage examples - Introduction to Secure Multi-Party Computation - Analysis of Pros and Cons - Libraries of SMPC and usage examples - Other approaches: Differential Privacy, Functional Encryption.
bottom of page