Главная
Study mode:
on
1
Intro
2
Prologue
3
Sharing Information w/ Privacy
4
Secure Computation (2PC)
5
Security in Secure Computation
6
Adversaries
7
Formalize/Prove Security (HbC)
8
How to Implement 2PC?
9
Privacy-Preserving Information Sharing with 2PC?
10
Private Set Intersection (PSI)
11
Private Set Intersection?
12
Straightforward PSI
13
Background: Pseudorandom Functions
14
Oblivious PRF
15
OPRF-based PSI
16
PSI w/ Data Transfer (PSI-DT) Server
17
A closer look at PSI
18
Authorized Private Set Intersection (APSI)
19
OPRF w/ Implicit Signature Verification
20
A simple OPRF-like with ISV
21
OPRF with ISV - Malicious Security
22
Set Size in PSI
23
SHI-PSI: The Building Blocks
24
Other Building Blocks
25
Collaborative Anomaly Detection
Description:
Explore privacy-preserving information sharing techniques and applications in this comprehensive lecture by Dr. Emiliano De Cristofaro from the Alan Turing Institute. Delve into secure computation methods, including two-party computation (2PC) and its implementation. Examine private set intersection (PSI) protocols, including straightforward PSI, oblivious pseudorandom functions, and PSI with data transfer. Investigate authorized private set intersection (APSI) and its security features. Learn about collaborative anomaly detection and other building blocks in privacy-enhancing technologies. Gain insights into the intersection of machine learning, security, and privacy from an expert in the field.

Privacy-Preserving Information Sharing - Tools and Applications

Alan Turing Institute
Add to list
0:00 / 0:00