Test
|
Zero Knowledge Proofs (ZKP) | Pseudonymisation | Private Information Retrieval (PIR) |
Attribute-Based Encryption (ABE) | Differential Privacy | Interactive Multi-Party Computation (MPC) | Federated Learning | Homomorphic Encryption | Trusted Execution Environment (TEE) | |
---|---|---|---|---|---|---|---|---|---|
Description | A cryptographic technique where one party (the prover) can prove to another party (the verifier) that a given statement is true without revealing all / any inputs that build up the statement. | High level design approach of replacing information that identifies an individual with a pseudonym. | A cryptographic technique that enables information retrieval from a server / database without revealing which item is retrieved. | A generalisation of encryption schemes where decryption of a ciphertext is only possible if the user key’s attributes match the attributes of the ciphertext (e.g., account ID, email address). | A cryptographic technique that shares information about a dataset without revealing information about individuals in the dataset. | A cryptographic technique that enables different parties to jointly compute a function over certain inputs while keeping the inputs private. | A distributed machine learning approach enabling multiple parties to collaboratively train a model without sharing their data with each other. | A cryptographic technique that enables computation over encrypted private data, which decryption returns a result identical to if the computation was performed over plaintext. | A secure area of a computation processor that guarantees code and data loaded inside are protected with respect to confidentiality and integrity. |
Example Projects Developing / Utilising PET for Privacy | Aztec, Miden, Aleo | Equifax and most traditional finance institutions | Google and Meta | IBM and big tech generally | Apple, Google and big tech generally | Taceo, dWallet Labs | NVIDIA, Google, Apple | Zama, Phenix, Inco, Sunscreen | Flashbots, Secret Network, Marlin |
Used in production |
✅ First proposed in the 1980s, the technology is securing >$1b of assets on DLTs combined. |
✅ Common way to comply with the GDPR in traditional web development. |
❌ Most PIR protocols are still in research and development. |
✅ First proposed in the 1980s and growingly adopted in businesses. |
✅ Adopted across different companies. |
✅ Applied in different large-scale projects. |
✅ Adopted across different companies. |
❌ Homomorphic encryption schemes are mostly in research and development. |
✅ Adopted across different fields. |
Made with HTML Tables
Related articles
No items found.