By Azeezat Lawal, Dami Ogunnupebi, Tarun Sidhu, Pradip Ghimire, Abdul-Hafis Osuwa

Walkthrough

Privacy Preserving Cryptography Walkthrough Audio
Walkthrough Transcript

Teaching Aide

Supplementary Documentation

Questions

  • What are some real life applications of Homomorphic Encryption (HE) that you can think of?
  • What factors must be true for Secure Multi-Party Computation to take place?
  • In a world where deepfakes and AI can imitate anyone online, how can we use anonymous credentials to prove what’s real and who’s trustworthy, without giving away our personal information?

Leave a comment