Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Trustless Attestation Verification in Distributed Confidential Computing

Confidential Computing Consortium via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about trustless attestation verification mechanisms in distributed confidential computing environments through this 29-minute conference talk by Donghang Lu from the Confidential Computing Consortium. Explore the challenges and solutions for verifying attestations without relying on trusted third parties in distributed systems that handle sensitive data. Discover how attestation protocols work in confidential computing architectures and understand the technical approaches for establishing trust in decentralized environments. Examine the security implications and practical implementations of trustless verification systems that enable secure computation across multiple parties while maintaining data confidentiality and integrity.

Syllabus

Trustless Attestation Verification in Distributed Confidential Computing – Donghang Lu

Taught by

Confidential Computing Consortium

Reviews

Start your review of Trustless Attestation Verification in Distributed Confidential Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.