MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
AI, Data Science & Business Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the strengths and limitations of applied homomorphic encryption in this informative talk. Delve into the workings of RSA encryption and discover a critical pitfall it faces, which homomorphic encryption aims to address. Gain insights into these encryption models through the lens of the Confidentiality-Integrity-Availability (CIA) Triad. Learn about basic communication, local encryption, data usage, and the concept of homomorphism in cryptography. Examine practical examples, including search functionality in encrypted data, and understand the implications for data integrity. Enhance your understanding of this largely theoretical yet promising field in modern cryptography.
Syllabus
Intro
Basic Communication
Solution: Encryption
Threat Model 2
Local Encryption
Using the Data
What do we want
Homowhatism
Some Examples
Intuition
Open the Country Gates
Example: Search
Final Encryption
What about Integrity?
Questions?
Taught by
White Hat Cal Poly