Privacy-Preserving Information Sharing - Tools and Applications
Offered By: Alan Turing Institute via YouTube
Course Description
Overview
Explore privacy-preserving information sharing techniques and applications in this comprehensive lecture by Dr. Emiliano De Cristofaro from the Alan Turing Institute. Delve into secure computation methods, including two-party computation (2PC) and its implementation. Examine private set intersection (PSI) protocols, including straightforward PSI, oblivious pseudorandom functions, and PSI with data transfer. Investigate authorized private set intersection (APSI) and its security features. Learn about collaborative anomaly detection and other building blocks in privacy-enhancing technologies. Gain insights into the intersection of machine learning, security, and privacy from an expert in the field.
Syllabus
Intro
Prologue
Sharing Information w/ Privacy
Secure Computation (2PC)
Security in Secure Computation
Adversaries
Formalize/Prove Security (HbC)
How to Implement 2PC?
Privacy-Preserving Information Sharing with 2PC?
Private Set Intersection (PSI)
Private Set Intersection?
Straightforward PSI
Background: Pseudorandom Functions
Oblivious PRF
OPRF-based PSI
PSI w/ Data Transfer (PSI-DT) Server
A closer look at PSI
Authorized Private Set Intersection (APSI)
OPRF w/ Implicit Signature Verification
A simple OPRF-like with ISV
OPRF with ISV - Malicious Security
Set Size in PSI
SHI-PSI: The Building Blocks
Other Building Blocks
Collaborative Anomaly Detection
Taught by
Alan Turing Institute
Related Courses
Applied CryptographyUniversity of Virginia via Udacity FHE and Private Set Intersection
Simons Institute via YouTube Homomorphic Encryption in the SPDZ Protocol for MPC
Simons Institute via YouTube Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube