Category: Privacy-Preserving Technologies

Multi-Party Computation

Multi-Party Computation, or MPC, is a method that allows several people or organisations to work together on a calculation using their own private data, without revealing that data to each other. Each participant only learns the result of the computation, not the other parties’ inputs. This makes it possible to collaborate securely, even if there…

Homomorphic Encryption

Homomorphic encryption is a method of encrypting data so that calculations can be performed on it without needing to decrypt it first. This means sensitive information can remain secure while still being processed or analysed. The results of the calculations, when decrypted, are the same as if they had been performed on the original data….

Decentralised Identity (DID)

Decentralised Identity (DID) is a way for people or organisations to control their digital identity without relying on a central authority like a government or a big company. With DIDs, users create and manage their own identifiers, which are stored on a blockchain or similar distributed network. This approach gives individuals more privacy and control…

Private Key Management

Private key management refers to the processes and tools used to securely store, use, and protect cryptographic private keys. These keys are critical for accessing encrypted data or authorising digital transactions, so their security is essential to prevent unauthorised access. Good private key management involves creating, storing, backing up, and eventually destroying private keys safely,…

Data Tokenisation

Data tokenisation is a security process that replaces sensitive information, like credit card numbers, with unique identifiers called tokens. These tokens have no meaningful value if accessed by unauthorised people, but they can be mapped back to the original data by someone with the right permissions. This helps protect confidential information while still allowing systems…

Data Privacy Compliance

Data privacy compliance means following laws and rules that protect personal information collected, stored, or used by organisations. These rules are set by governments to make sure companies handle data responsibly and do not misuse or expose private details. Compliance often involves getting permission from individuals, securing information, and being transparent about how data is…

Federated Learning

Federated learning is a way for multiple devices or organisations to work together to train a machine learning model without sharing their raw data. Instead, each participant trains the model on their own local data and only shares updates, such as changes to the model’s parameters, with a central server. This approach helps protect privacy…