Test

November 5, 2024
4
MIN READ
Blog
>
>
>
Test
|
TABLE 1 – COMPARISON OF PRIVACY-ENHANCING TECHNOLOGIES

Zero Knowledge Proofs (ZKP) Pseudonymisation Private Information Retrieval
(PIR)
Attribute-Based Encryption (ABE) Differential Privacy Interactive Multi-Party Computation (MPC) Federated Learning Homomorphic Encryption Trusted Execution Environment (TEE)
Description A cryptographic technique where one party (the prover) can prove to another party (the verifier) that a given statement is true without revealing all / any inputs that build up the statement. High level design approach of replacing information that identifies an individual with a pseudonym. A cryptographic technique that enables information retrieval from a server / database without revealing which item is retrieved. A generalisation of encryption schemes where decryption of a ciphertext is only possible if the user key’s attributes match the attributes of the ciphertext (e.g., account ID, email address). A cryptographic technique that shares information about a dataset without revealing information about individuals in the dataset. A cryptographic technique that enables different parties to jointly compute a function over certain inputs while keeping the inputs private. A distributed machine learning approach enabling multiple parties to collaboratively train a model without sharing their data with each other. A cryptographic technique that enables computation over encrypted private data, which decryption returns a result identical to if the computation was performed over plaintext. A secure area of a computation processor that guarantees code and data loaded inside are protected with respect to confidentiality and integrity.
Example Projects Developing / Utilising PET for Privacy Aztec, Miden, Aleo Equifax and most traditional finance institutions Google and Meta IBM and big tech generally Apple, Google and big tech generally Taceo, dWallet Labs NVIDIA, Google, Apple Zama, Phenix, Inco, Sunscreen Flashbots, Secret Network, Marlin
Used in production
First proposed in the 1980s, the technology is securing >$1b of assets on DLTs combined.

Common way to comply with the GDPR in traditional web development.

Most PIR protocols are still in research and development.

First proposed in the 1980s and growingly adopted in businesses.

Adopted across different companies.

Applied in different large-scale projects.

Adopted across different companies.

Homomorphic encryption schemes are mostly in research and development.

Adopted across different fields.
Made with HTML Tables
Check Circle 1 Streamline Icon: https://streamlinehq.com
Oops! Something went wrong. Please retry
By subscribing you agree to with our Privacy Policy and provide consent to receive updates from Aztec.