Skip to content

Latest commit

 

History

History
55 lines (33 loc) · 3.15 KB

awesome-pets.md

File metadata and controls

55 lines (33 loc) · 3.15 KB

awesome-PETs

A curated list of papers and SecretFlow's tutorials on Privacy-Enhancing Technologies (PETs). In this list, we only define and categorie techniques that help maintain the security and privacy of data.

Please feel free to open a pull request.

Papers

Tools and Primitives

Cryptography-based techniques. If you are a beginner in cryptography, and wants to learn about the theory or applications of crypto, please also checkout our [crypto-for-beginners] list.

  1. Secure Multi-Party Computation (MPC) (Contributors: @jamie-cui @DuanYuFi@Mingbo-Lee)
  2. Zero-Knowledge Proof (ZKP) (Contributors: @xfap @yuzhouwudizuilihai @zlyber @rhocos3theta)
  3. Homomorphic Encryption (HE) (Contributors: @zhangwfjh)

Anonymity-related techniques

  1. Differential Privacy (DP) (Contributors: @yingting6)

Hardware-based solutions

  1. Trusted Execution Environment (TEE)

Applications of PETs

Private Set/Database Operations

  1. Private Set Intersection (PSI) (Contributors: @jamie-cui @tarantula-leo)

Protecting training/inference data

  1. PPML based on Crypto (Contributors: @llCurious @Mingbo-Lee)
  2. Ferderated Learning (FL) (Contributors: @zhangxingmeng @FelixZheng1 @Cryptocxf)

Attacks on machine learning system

  1. General attacks and defense (Contributors: @zhangxingmeng @JDywz)

Multimedia Privacy and Security

  1. Summaries and Talks (Contributors: @XiaoHwei)
  2. Attack Methods (Contributors: @XiaoHwei)
  3. Defense Methods (Contributors: @XiaoHwei)

Other Resources

We're sorry some of the materials are avaliable only in Chinese, we'll try to provide an English version in the future.

  1. Team SecretFlow's Papers
  2. Team SecretFlow's Talks (on bilibili.com)
  3. Team SecretFlow's Posts (on wechat)