YoVDO

Privacy-Preserving Information Sharing - Tools and Applications

Offered By: Alan Turing Institute via YouTube

Tags

Secure Computation Courses Private Set Intersection Courses Pseudorandom Functions Courses

Course Description

Overview

Explore privacy-preserving information sharing techniques and applications in this comprehensive lecture by Dr. Emiliano De Cristofaro from the Alan Turing Institute. Delve into secure computation methods, including two-party computation (2PC) and its implementation. Examine private set intersection (PSI) protocols, including straightforward PSI, oblivious pseudorandom functions, and PSI with data transfer. Investigate authorized private set intersection (APSI) and its security features. Learn about collaborative anomaly detection and other building blocks in privacy-enhancing technologies. Gain insights into the intersection of machine learning, security, and privacy from an expert in the field.

Syllabus

Intro
Prologue
Sharing Information w/ Privacy
Secure Computation (2PC)
Security in Secure Computation
Adversaries
Formalize/Prove Security (HbC)
How to Implement 2PC?
Privacy-Preserving Information Sharing with 2PC?
Private Set Intersection (PSI)
Private Set Intersection?
Straightforward PSI
Background: Pseudorandom Functions
Oblivious PRF
OPRF-based PSI
PSI w/ Data Transfer (PSI-DT) Server
A closer look at PSI
Authorized Private Set Intersection (APSI)
OPRF w/ Implicit Signature Verification
A simple OPRF-like with ISV
OPRF with ISV - Malicious Security
Set Size in PSI
SHI-PSI: The Building Blocks
Other Building Blocks
Collaborative Anomaly Detection


Taught by

Alan Turing Institute

Related Courses

Lattices, Multilinear Maps and Program Obfuscation
Simons Institute via YouTube
Cryptographic Protocols and Secure Computation I
TheIACR via YouTube
Isogeny-Based Cryptography
TheIACR via YouTube
Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus
TheIACR via YouTube
Correlated Pseudorandom Functions from Variable-Density LPN
IEEE via YouTube