LACE
Basics of PETs for Non-Technical Practitioners
Your progress
0% completed
Give Feedback
Switch Device
Toggle theme
Introduction
Federated Learning
Differential Privacy
Homomorphic Encryption
Secure Multi-Party Computation
Zero-Knowledge Proof
Homomorphic Encryption
Quiz
Please mark all statements that are true:
Homomorphic Encryption (HE) allows you to encrypt your data before it is transmitted to a third party.
Public Key Encryption involves securely exchanging the private key over an insecure channel.
In Private Key Encryption, data is encrypted with the public key and decrypted with the private key.
With traditional encryption schemes, the encrypted data is protected when it is transmitted over a network or stored in a database.
The ciphertext does not reveal any information about the plaintext without the decryption key.
In HE, the only allowed operations are addition and subtraction.
In HE, the result from the addition of two ciphertexts is equal to the encrypted result from the addition of the two corresponding plaintexts.
Submit
Please mark all statements that are true:
In Fully Homomorphic Encryption (FHE), both addition and multiplication can be performed infinitely often.
HE can be seen as a panacea for most privacy-related challenges an organization faces.
With HE, companies can outsource their computations without sharing the raw data with third parties.
HE does not scale well, making it impractical for large data sets.
According to Gartner, HE will likely not gain widespread adoption for another 5-10 years.
HE can be used to develop ML models that can help detect or even predict common illnesses.
Partial HE, Somewhat HE, and Fully HE result in a large performance overhead and are not suited for most real-world use-cases.
Submit
In contrast to traditional encryption methods, Homomorphic Encryption protects data ...
at rest.
in transit.
in use.
Submit
Which type of Homomorphic Encryption can perform both addition and multiplication but only for a limited number of operations?
Partial Homomorphic Encryption
Somewhat Homomorphic Encryption
Fully Homomorphic Encryption
Submit
What does Homomorphic Encryption guarantee?
The confidentiality of the encrypted data.
The instantaneous decryption of data.
The integrity of the encrypted data.
Submit
What are the applications of Homomorphic Encryption?
Secure Cloud Computation
Secure Key Generation
Secure Machine Learning
Submit
Homomorphic Encryption is ideally suited for ...
Small datasets
Lightweight computations
Cooperation with fully trusted parties
Submit
In the Ordering exercise, your task is to chronologically arrange the steps of a Federated Learning iteration.
Order the following answers
Alice encrypts the confidential data using the public key.
Alice sends the encrypted data to an external sever.
Alice requests the server to perform operations on the data.
Alice generates a public and a private key.
The server sends the encrypted result to Alice.
Alice decrypts the confidential result using the private key.
Submit
Congratulations, you've completed all chapters!
You've completed all chapters. You can review the course or start a new one.
Back to Courses
Previous slide
Next slide