LACE
Basics of PETs for Non-Technical Practitioners
Your progress
0% completed
Give Feedback
Switch Device
Toggle theme
Introduction
Federated Learning
Differential Privacy
Homomorphic Encryption
Secure Multi-Party Computation
Zero-Knowledge Proof
Secure Multi-Party Computation
Quiz
Please mark all statements that are true:
SMPC allows multiple parties to perform a joint computation without disclosing their private inputs by outsourcing the computation to a trusted third party.
Adversaries are able to control a subset of participants for their purposes.
Semi-honest adversaries don't actively interfere with the protocol execution.
A malicious attacker can disregard the given protocol in its entirety.
In the adaptive corruption model, corrupt parties can become honest during protocol execution and honest participants can get corrupted.
A trade-off between security and efficiency is often unavoidable.
A trade-off between privacy and utility is unavoidable.
Submit
Please mark all statements that are true:
Resource constraints of the participating devices don’t affect the SMPC process.
Adopting SMPC can lead to high communication costs.
If you want to increase security, you have to sacrifice computing power.
According to Gartner, SMPC will likely not gain widespread adoption for another 10-20 years.
SMPC enables the joint training of an ML model.
Homomorphic Encryption is a basic cryptographic primitive that can be used for SMPC.
Submit
What are requirements of an SMPC system?
Independence of Inputs
Guaranteed output delivery
Centralized Computation
Submit
What is the purpose of the 'ideal world' model in SMPC?
To provide a relatively straightforward definition of "security" in the context of the SMPC.
To demonstrate the practical implementation of SMPC protocols.
To demonstrate that SMPC can only be applied if there is an external party that all participants can trust completely.
Submit
Which type of adversary is also known as a passive attacker?
Malicious adversary
Covert adversary
Semi-honest adversary
Submit
In a (2,3) Secret Sharing Scheme (SSS), what is the total number of participants involved?
Participants: 2
Participants: 3
Participants: 3 or 2
Submit
SMPC is ideally suited for situations in which ...
two or more parties want to collaborate.
an external entity can be fully trusted.
there is a reasonable trade-off between security and efficiency.
Submit
What are the applications of SMPC?
Data Analytics
Privacy-Preserving Genomics
Secure Auctions
Submit
The original Yao's Garbled Circuits algorithm ...
allows multiple parties to perform a joint computation without disclosing their private inputs.
is based on Oblivious Transfer.
is secure against malicious adversaries.
Submit
Congratulations, you've completed all chapters!
You've completed all chapters. You can review the course or start a new one.
Back to Courses
Previous slide
Next slide