Trustless Attestation Verification in Distributed Confidential Computing
Confidential Computing Consortium via YouTube
Learn Python with Generative AI - Self Paced Online
Get 20% off all career paths from fullstack to AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about trustless attestation verification mechanisms in distributed confidential computing environments through this 29-minute conference talk by Donghang Lu from the Confidential Computing Consortium. Explore the challenges and solutions for verifying attestations without relying on trusted third parties in distributed systems that handle sensitive data. Discover how attestation protocols work in confidential computing architectures and understand the technical approaches for establishing trust in decentralized environments. Examine the security implications and practical implementations of trustless verification systems that enable secure computation across multiple parties while maintaining data confidentiality and integrity.
Syllabus
Trustless Attestation Verification in Distributed Confidential Computing – Donghang Lu
Taught by
Confidential Computing Consortium