Completed
Additive Homomorphic Privacy Transformations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Zeph - Cryptographic Enforcement of End-to-End Data Privacy
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 One of Many Scenarios
- 3 Existing End-to-End Encrypted Streaming Pipeline
- 4 Integrate Privacy Controls into Existing Pipelines
- 5 Zeph's End-to-End Approach to Privacy
- 6 Zeph's Threat Model and Assumptions
- 7 How Zeph augments existing System Designs
- 8 Keep End-User Control Simple
- 9 Organize Privacy Transformations
- 10 Meeting Privacy Transformation Requirements
- 11 Additive Homomorphic Secret Sharing
- 12 Additive Homomorphic Privacy Transformations
- 13 Independent and Efficient Privacy Controller
- 14 Enable Federated Privacy Control
- 15 Zeph Implementation and Evaluation
- 16 Web Analytics: End-to-End Benchmark