Trustless Attestation Verification in Distributed Confidential Computing
Confidential Computing Consortium via YouTube
35% Off Finance Skills That Get You Hired - Code CFI35
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about trustless attestation verification mechanisms in distributed confidential computing environments through this 29-minute conference talk by Donghang Lu from the Confidential Computing Consortium. Explore the challenges and solutions for verifying attestations without relying on trusted third parties in distributed systems that handle sensitive data. Discover how attestation protocols work in confidential computing architectures and understand the technical approaches for establishing trust in decentralized environments. Examine the security implications and practical implementations of trustless verification systems that enable secure computation across multiple parties while maintaining data confidentiality and integrity.
Syllabus
Trustless Attestation Verification in Distributed Confidential Computing – Donghang Lu
Taught by
Confidential Computing Consortium