Privacy-Preserving Information Sharing - Tools and Applications

Privacy-Preserving Information Sharing - Tools and Applications

Alan Turing Institute via YouTube Direct link

Intro

1 of 25

1 of 25

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Privacy-Preserving Information Sharing - Tools and Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Prologue
  3. 3 Sharing Information w/ Privacy
  4. 4 Secure Computation (2PC)
  5. 5 Security in Secure Computation
  6. 6 Adversaries
  7. 7 Formalize/Prove Security (HbC)
  8. 8 How to Implement 2PC?
  9. 9 Privacy-Preserving Information Sharing with 2PC?
  10. 10 Private Set Intersection (PSI)
  11. 11 Private Set Intersection?
  12. 12 Straightforward PSI
  13. 13 Background: Pseudorandom Functions
  14. 14 Oblivious PRF
  15. 15 OPRF-based PSI
  16. 16 PSI w/ Data Transfer (PSI-DT) Server
  17. 17 A closer look at PSI
  18. 18 Authorized Private Set Intersection (APSI)
  19. 19 OPRF w/ Implicit Signature Verification
  20. 20 A simple OPRF-like with ISV
  21. 21 OPRF with ISV - Malicious Security
  22. 22 Set Size in PSI
  23. 23 SHI-PSI: The Building Blocks
  24. 24 Other Building Blocks
  25. 25 Collaborative Anomaly Detection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.