A curated list of papers and SecretFlow's tutorials on Privacy-Enhancing Technologies (PETs). In this list, we only define and categorie techniques that help maintain the security and privacy of data.
Please feel free to open a pull request.
Cryptography-based techniques. If you are a beginner in cryptography, and wants to learn about the theory or applications of crypto, please also checkout our [crypto-for-beginners] list.
- Secure Multi-Party Computation (MPC) (Contributors: @jamie-cui @DuanYuFi@Mingbo-Lee)
- Zero-Knowledge Proof (ZKP) (Contributors: @xfap @yuzhouwudizuilihai @zlyber @rhocos3theta)
- Homomorphic Encryption (HE) (Contributors: @zhangwfjh)
Anonymity-related techniques
- Differential Privacy (DP) (Contributors: @yingting6)
Hardware-based solutions
Private Set/Database Operations
- Private Set Intersection (PSI) (Contributors: @jamie-cui @tarantula-leo)
Protecting training/inference data
- PPML based on Crypto (Contributors: @llCurious @Mingbo-Lee)
- Ferderated Learning (FL) (Contributors: @zhangxingmeng @FelixZheng1 @Cryptocxf)
Attacks on machine learning system
- General attacks and defense (Contributors: @zhangxingmeng @JDywz)
Multimedia Privacy and Security
- Summaries and Talks (Contributors: @XiaoHwei)
- Attack Methods (Contributors: @XiaoHwei)
- Defense Methods (Contributors: @XiaoHwei)
We're sorry some of the materials are avaliable only in Chinese, we'll try to provide an English version in the future.