Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Privacy-Preserving Information Sharing - Tools and Applications

Alan Turing Institute via YouTube

Overview

Explore privacy-preserving information sharing techniques and applications in this comprehensive lecture by Dr. Emiliano De Cristofaro from the Alan Turing Institute. Delve into secure computation methods, including two-party computation (2PC) and its implementation. Examine private set intersection (PSI) protocols, including straightforward PSI, oblivious pseudorandom functions, and PSI with data transfer. Investigate authorized private set intersection (APSI) and its security features. Learn about collaborative anomaly detection and other building blocks in privacy-enhancing technologies. Gain insights into the intersection of machine learning, security, and privacy from an expert in the field.

Syllabus

Intro
Prologue
Sharing Information w/ Privacy
Secure Computation (2PC)
Security in Secure Computation
Adversaries
Formalize/Prove Security (HbC)
How to Implement 2PC?
Privacy-Preserving Information Sharing with 2PC?
Private Set Intersection (PSI)
Private Set Intersection?
Straightforward PSI
Background: Pseudorandom Functions
Oblivious PRF
OPRF-based PSI
PSI w/ Data Transfer (PSI-DT) Server
A closer look at PSI
Authorized Private Set Intersection (APSI)
OPRF w/ Implicit Signature Verification
A simple OPRF-like with ISV
OPRF with ISV - Malicious Security
Set Size in PSI
SHI-PSI: The Building Blocks
Other Building Blocks
Collaborative Anomaly Detection

Taught by

Alan Turing Institute

Reviews

Start your review of Privacy-Preserving Information Sharing - Tools and Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.