-
> **Note:** this is a bit messy, will be cleaned some time soon
## Background
- **Privacy-preserving computation**: either X of F are hidden to who computes F(X)
- **Verifiable computation**: A…
-
HE is the process of performing operations directly on encrypted data
HE is more computationally expensive, but doesn't require any interaction between parties. MPC is computationally cheaper, but …
-
- [x] lucky and hi world buttons should be same size
- [x] change logo in home button
- [x] check if logo is correct on all relevant stories
- [x] add `feedback` button in dashboard
- [x] remove unne…
-
### Session description
@bmcase and I, along with several differential privacy researchers, have developed a compelling privacy framework where each device tracks and controls the privacy loss incurr…
-
We don't want node providers to be able to read the state data of canisters they host. This might be accomplished through:
* Multi party computation
* Secure enclaves
* Homomorphic encryption
-
ADV is for Authorized Data Vaults - where the storage provider has access to the data so they can re-encrypt it?
For example, in the ML use-case, the owner of a secure (Intel SGX) enclave in the cl…
-
こんにちは TAG-さん!
I'm requesting a TAG review of Document-Isolation-Policy.
Developers want to build applications that are fast using [SharedArrayBuffers](https://developer.mozilla.org/en-US/docs/We…
-
The way i understand the steps
1. User visits the page and browser calls Parakeet service
2. Parakeet services generates C',S' parameters and calls multiple SSPs for each Interest Group. The SSPs…
-
## Question
is it possible to train a neural network on encrypted values using Secure Multi-Party Computation and Autograd?
## Further Information
I found a blog from pysyft that can perform encr…
-
I want to run a remote example of MPC, but when I run the PySyft/packages/syft/examples/secure-multi-party-computation/Duet/1-DS-1-DO, there's a bug "The session *** could not be found". I also run so…