PETs Overview
Data Collaboration and PETs
Regulatory Perspectives on PETs
Confidential Computing
Innovations in Privacy Technologies
100

This PET technique ensures that only the intended recipients can access and read data.

What is Encryption?

100

The process of sharing data securely among different organizations using PETs.

What is Secure Data Sharing?

100

An EU regulation that enhances data protection and privacy for individuals.

What is the General Data Protection Regulation (GDPR)?

100

Protects data in use by performing computation in a hardware-based, attested Trusted Execution Environment

What is Confidential Computing?

100

A novel PET that has recently been developed for real-time data encryption.

What is Quantum Encryption?

200

This PET encrypts data in such a way that it can be computed on without revealing its contents.

What is Homomorphic Encryption?

200

A technology that enables secure data sharing without exposing the actual data.

What is Data Masking?

200

The concept of ensuring data privacy compliance through PETs according to this regulation.

What is GDPR Compliance through PETs?

200

This early work on privacy-preserving computation by Rivest, Adleman, and Dertouzos introduced concepts central to what would later be known as Confidential Computing.

What is On Data Banks and Privacy Homomorphisms

200

This technology applies PETs to enhance blockchain privacy and security.

What is Zero-Knowledge Proofs?

300

A framework or environment that isolates computation to protect sensitive data in use.

What is a Trusted Execution Environment?

300

PETs used to create a secure environment for collaborative AI and machine learning.

What is Federated Learning?

300

This term describes the minimum amount of information needed to uniquely identify an individual within a dataset, challenging assumptions about anonymized data's privacy.

What is Unicity?

300

This form of encryption allows for computations on encrypted data without needing to decrypt it first, complementing Confidential Computing strategies.

What is Homomorphic Encryption?

300

An emerging field combining PETs with this type of computing to secure data processing.

What is Edge Computing with PETs?

400

A PET that allows multiple parties to compute a function over their inputs while keeping them private.

What is Secure Multi-Party Computation?

400

This PET technique ensures the privacy of data contributors in collaborative settings.

What is Privacy-Preserving Aggregation?

400

An international standard that specifies techniques for privacy and data protection.

What is ISO/IEC 27701?

400

The year when the first significant breakthrough in Fully Homomorphic Encryption, a key underpinning of Confidential Computing, was achieved.

What is 2009?

400

A project focusing on the development of PETs for securing IoT devices.

What is Secure IoT Frameworks?

500

There are three different threat models to consider with PETS: Data in rest, transit and...

What is Data in Use? 

500

The biggest challenge in implementing PETs for data collaboration across industries.

What is Interoperability?

500

The regulatory body in the EU known for publishing guidelines on the use of PETs.

What is the European Data Protection Board (EDPB)?

500

This process in Confidential Computing verifies the integrity of the computing environment to ensure it hasn't been tampered with.

What is Remote Attestation?

500

The latest trend in PETs aiming to revolutionize data privacy in cloud computing environments.

What is Confidential Cloud Computing?

M
e
n
u