Trustless Attestation Verification in Distributed Confidential Computing
Confidential Computing Consortium via YouTube
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about trustless attestation verification mechanisms in distributed confidential computing environments through this 29-minute conference talk by Donghang Lu from the Confidential Computing Consortium. Explore the challenges and solutions for verifying attestations without relying on trusted third parties in distributed systems that handle sensitive data. Discover how attestation protocols work in confidential computing architectures and understand the technical approaches for establishing trust in decentralized environments. Examine the security implications and practical implementations of trustless verification systems that enable secure computation across multiple parties while maintaining data confidentiality and integrity.
Syllabus
Trustless Attestation Verification in Distributed Confidential Computing – Donghang Lu
Taught by
Confidential Computing Consortium