Privacy-Preserving Information Sharing - Tools and Applications
Offered By: Alan Turing Institute via YouTube
Course Description
Overview
Explore privacy-preserving information sharing techniques and applications in this comprehensive lecture by Dr. Emiliano De Cristofaro from the Alan Turing Institute. Delve into secure computation methods, including two-party computation (2PC) and its implementation. Examine private set intersection (PSI) protocols, including straightforward PSI, oblivious pseudorandom functions, and PSI with data transfer. Investigate authorized private set intersection (APSI) and its security features. Learn about collaborative anomaly detection and other building blocks in privacy-enhancing technologies. Gain insights into the intersection of machine learning, security, and privacy from an expert in the field.
Syllabus
Intro
Prologue
Sharing Information w/ Privacy
Secure Computation (2PC)
Security in Secure Computation
Adversaries
Formalize/Prove Security (HbC)
How to Implement 2PC?
Privacy-Preserving Information Sharing with 2PC?
Private Set Intersection (PSI)
Private Set Intersection?
Straightforward PSI
Background: Pseudorandom Functions
Oblivious PRF
OPRF-based PSI
PSI w/ Data Transfer (PSI-DT) Server
A closer look at PSI
Authorized Private Set Intersection (APSI)
OPRF w/ Implicit Signature Verification
A simple OPRF-like with ISV
OPRF with ISV - Malicious Security
Set Size in PSI
SHI-PSI: The Building Blocks
Other Building Blocks
Collaborative Anomaly Detection
Taught by
Alan Turing Institute
Related Courses
Lattices, Multilinear Maps and Program ObfuscationSimons Institute via YouTube Cryptographic Protocols and Secure Computation I
TheIACR via YouTube Isogeny-Based Cryptography
TheIACR via YouTube Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus
TheIACR via YouTube Correlated Pseudorandom Functions from Variable-Density LPN
IEEE via YouTube