By Azeezat Lawal, Dami Ogunnupebi, Tarun Sidhu, Pradip Ghimire, Abdul-Hafis Osuwa
Walkthrough
Walkthrough Transcript
Teaching Aide
Supplementary Documentation
Questions
- What are some real life applications of Homomorphic Encryption (HE) that you can think of?
- What factors must be true for Secure Multi-Party Computation to take place?
- In a world where deepfakes and AI can imitate anyone online, how can we use anonymous credentials to prove what’s real and who’s trustworthy, without giving away our personal information?