Tagged articles
86 articles
Page 1 of 1
Lao Guo's Learning Space
Lao Guo's Learning Space
Apr 29, 2026 · Big Data

Designing a Full-Stack Credit Data System: From Ingestion to Real-Time Decision

The article dissects a credit data system architecture, detailing six logical layers—from multi-source data collection and feature engineering (including graph features and feature stores) to model training, real‑time stream processing, decision engine integration, and privacy‑preserving computation—while explaining the trade‑offs, tools, and performance targets needed for accurate, low‑latency risk assessment.

Credit ScoringFeature StoreFlink
0 likes · 16 min read
Designing a Full-Stack Credit Data System: From Ingestion to Real-Time Decision
dbaplus Community
dbaplus Community
Jan 21, 2026 · Information Security

How Large Language Models Transform Data Security: Frameworks, Challenges, and Real-World Practices

This article reviews the current state, feasibility, industry adoption, concrete deployment scenarios, and future directions of applying large language models to data security, covering technical challenges, architectural designs, prompt engineering, privacy‑preserving techniques, and practical case studies.

AI applicationsLLM engineeringPrivacy Computing
0 likes · 21 min read
How Large Language Models Transform Data Security: Frameworks, Challenges, and Real-World Practices
Alimama Tech
Alimama Tech
Aug 13, 2025 · Information Security

How Private Set Operations Secure Data Collaboration in the Big Data Era

Private Set Operations (PSO) enable multiple parties to perform set intersections, unions, and related computations on encrypted data, preserving privacy through cryptographic techniques such as public‑key encryption, oblivious transfer, and garbled circuits, and are applied across advertising, finance, healthcare, and government for secure data collaboration.

AdvertisingPrivacy Computingcryptography
0 likes · 20 min read
How Private Set Operations Secure Data Collaboration in the Big Data Era
Alimama Tech
Alimama Tech
Aug 6, 2025 · Information Security

How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising

This article reviews the background, core techniques, and typical applications of privacy‑enhancing technologies—including secure multi‑party computation, privacy‑preserving machine learning, differential privacy, and trusted execution environments—highlighting their role in unlocking multi‑party data value while ensuring compliance and privacy protection.

Federated LearningPrivacy Computingdifferential privacy
0 likes · 20 min read
How Privacy-Enhancing Technologies Are Revolutionizing Data Use in Digital Advertising
DataFunTalk
DataFunTalk
May 2, 2025 · Artificial Intelligence

SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice

The SecretFlow open‑source community and Chengdu Smart City Research Institute co‑host a deep‑tech meetup in Chengdu, featuring leading experts from Ant Group, UESTC, and industry partners who will explore privacy‑computing principles, SPU technology, federated learning, and real‑world financial and governmental use cases through talks and hands‑on workshops.

AIFederated LearningPrivacy Computing
0 likes · 8 min read
SecretFlow Meetup Chengdu – Privacy Computing Innovation and Application Practice
AntTech
AntTech
Apr 23, 2025 · Information Security

Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025

The International Symposium on Computer Architecture (ISCA) 2025 accepted two Ant Group research papers—FAST and Neo—detailing novel fully homomorphic encryption accelerators that combine cryptographic optimizations with hardware design to achieve significant performance gains for privacy‑preserving computation.

Ant GroupFHEISCA 2025
0 likes · 4 min read
Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025
Sohu Tech Products
Sohu Tech Products
Apr 2, 2025 · Artificial Intelligence

How SecretFlow Enables Privacy‑Preserving AI Model Training with Secure Multi‑Party Computation

SecretFlow is an open‑source privacy‑computing framework that lets multiple parties perform encrypted data analysis and AI model training without exposing raw data, offering unified MPC, federated learning and differential privacy features, with step‑by‑step Docker installation, Python examples, and a modular architecture for secure multi‑party computation.

AI model trainingData ProtectionPrivacy Computing
0 likes · 11 min read
How SecretFlow Enables Privacy‑Preserving AI Model Training with Secure Multi‑Party Computation
Data Thinking Notes
Data Thinking Notes
Dec 19, 2024 · Information Security

Unveiling 41 Official Data Terms: What They Mean for China’s Data Infrastructure

This article compiles the official definitions released by China’s National Data Bureau and other agencies for 41 data‑related terms, explains the concepts of data infrastructure, privacy‑preserving computing, trusted data spaces, and blockchain, and outlines how these definitions guide the nation’s data‑driven development strategy.

BlockchainData GovernancePrivacy Computing
0 likes · 25 min read
Unveiling 41 Official Data Terms: What They Mean for China’s Data Infrastructure
AntTech
AntTech
Aug 19, 2024 · Information Security

From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference

At the 2024 China Cryptography Society Cryptographic Chip Academic Conference in Chengdu, Ant Group’s Vice President Wei Tao highlighted the evolution from general to intelligent to secure computing, emphasizing the pivotal role of cryptographic chips in data protection, AI development, and cross‑industry applications while calling for deeper industry‑academia collaboration.

AIPrivacy Computingcryptographic chips
0 likes · 8 min read
From General Computing to Intelligent Computing to Secure Computing: Key Insights from the 2024 China Cryptography Society Cryptographic Chip Conference
AntTech
AntTech
Jul 7, 2024 · Information Security

2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models

The 2024 WAIC Privacy Computing Forum gathered leading experts from academia and industry to discuss how encryption, anonymization, and secure multi‑party computation can protect data privacy while enabling large‑model training and inference, highlighting technical challenges, standards, and emerging solutions across AI, big data, and information security domains.

AIMPCPrivacy Computing
0 likes · 15 min read
2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models
AntTech
AntTech
Jun 13, 2024 · Information Security

Privacy Computing Technology Theory and Practice – Highlights from the National Data Bureau’s 2024 Data Lecture Series

The National Data Bureau’s June 12, 2024 Data Lecture Hall focused on privacy computing technology theory and practice, featuring expert talks, emphasizing secure yet usable data sharing to boost the digital economy, and gathering over 110 officials and specialists to discuss challenges and solutions.

ChinaDigital EconomyPrivacy Computing
0 likes · 3 min read
Privacy Computing Technology Theory and Practice – Highlights from the National Data Bureau’s 2024 Data Lecture Series
AntTech
AntTech
Jun 7, 2024 · Information Security

Unified Security Grading Standards Are Essential for the Trusted Deployment of Privacy Computing

The article explains how the diversity of privacy‑computing techniques creates confusion and reluctance in industry, argues for a unified security‑capability grading framework, and highlights recent standard‑setting efforts such as the Q/NFEC0001‑2024 guideline to balance safety and performance across sectors.

FinTechPrivacy Computingartificial intelligence
0 likes · 6 min read
Unified Security Grading Standards Are Essential for the Trusted Deployment of Privacy Computing
AntTech
AntTech
Apr 24, 2024 · Information Security

Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification

Under the guidance of the People’s Bank of China, the Beijing FinTech Industry Alliance has published the 'Financial Industry Privacy Computing Interconnection Platform Technical Specification', a standard co‑authored by China UnionPay, major banks, universities, tech firms and telecom operators, with Ant Group playing a key role.

Ant GroupInteroperabilityPrivacy Computing
0 likes · 4 min read
Beijing FinTech Alliance Releases Privacy Computing Interoperability Platform Technical Specification
AntTech
AntTech
Mar 2, 2024 · Information Security

IEEE Releases First Global Standard for Privacy Computing Integrated Machine (IEEE 3156-2023)

The IEEE Standards Association has published the world’s first privacy‑computing integrated‑machine standard (IEEE 3156‑2023), highlighting China’s leadership in privacy‑preserving data technologies and outlining hardware, software, and security requirements that aim to foster global adoption and reduce collaboration costs.

Ant GroupIEEE StandardIntegrated Machine
0 likes · 4 min read
IEEE Releases First Global Standard for Privacy Computing Integrated Machine (IEEE 3156-2023)
Alimama Tech
Alimama Tech
Feb 29, 2024 · Industry Insights

How Alibaba’s Secure Data Hub Powers Cross‑Domain Advertising Tracking with Privacy‑Preserving Computation

This article details how Alibaba Mama’s Secure Data Hub (SDH) leverages multi‑party computation, federated learning, and differential privacy to break data silos in advertising, enabling secure cross‑domain user tracking, full‑domain asset analysis, and rapid, privacy‑compliant marketing insights.

Federated LearningMPCPrivacy Computing
0 likes · 18 min read
How Alibaba’s Secure Data Hub Powers Cross‑Domain Advertising Tracking with Privacy‑Preserving Computation
AsiaInfo Technology: New Tech Exploration
AsiaInfo Technology: New Tech Exploration
Feb 23, 2024 · Industry Insights

How Trusted Execution Environments are Shaping Data Security and Privacy Computing

The article examines the rapid growth of China's digital economy, the rising demand for secure data circulation, and how Trusted Execution Environments (TEE) are evolving through hardware and software advances, interoperability efforts, and large‑model privacy solutions to address emerging security challenges.

Privacy ComputingSecure ComputingTEE
0 likes · 17 min read
How Trusted Execution Environments are Shaping Data Security and Privacy Computing
Alimama Tech
Alimama Tech
Dec 21, 2023 · Information Security

Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising

Alibaba Mama’s Secure Data Hub delivers a privacy‑enhanced clean‑room for advertising by combining multi‑party computation, federated learning and differential privacy with encrypted operators on a Flink engine, offering cloud‑agnostic, scalable deployment that enables cross‑domain analytics while protecting raw user data and boosting ROI.

Federated LearningPrivacy Computingadvertising analytics
0 likes · 13 min read
Alibaba Mama Secure Data Hub: Cloud Architecture and Privacy-Preserving Advertising
AntTech
AntTech
Dec 12, 2023 · Information Security

Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank

This article presents a detailed case study of how Jiangsu Bank and Ningbo Bank leveraged Ant Group’s multi‑party secure computation platform and the “YinYu” privacy‑computing framework to build joint risk‑control models, enhancing data sharing, security, and approval rates for inclusive finance.

Inclusive FinanceMPCPrivacy Computing
0 likes · 9 min read
Privacy Computing Case Study: Multi‑Party Secure Computation for Financial Risk Control by Jiangsu Bank and Ningbo Bank
Alimama Tech
Alimama Tech
Dec 7, 2023 · Industry Insights

How Privacy Computing Enables Cross‑Domain Ad Tracking and Asset Analysis

The 2023 Big Data “Galaxy” case competition highlighted Alibaba Mama and Jiahe Tech’s privacy‑computing based cross‑domain advertising tracking and whole‑domain asset analysis as an outstanding example, detailing the Secure Data Hub platform, its use of multi‑party secure computation, federated learning, differential privacy, and the resulting improvements in data flow, compliance, and marketing efficiency.

Privacy Computingadvertising analyticscross-domain tracking
0 likes · 6 min read
How Privacy Computing Enables Cross‑Domain Ad Tracking and Asset Analysis
AntTech
AntTech
Nov 10, 2023 · Artificial Intelligence

Ant Group and Tsinghua University’s Distributed Collaborative Risk‑Defense System Wins Zhejiang Provincial Science & Technology Progress Award

The award‑winning distributed collaborative risk‑defense system, developed by Ant Group, Tsinghua University and Alipay, leverages AI, privacy‑preserving computing and graph analytics to achieve real‑time, high‑efficiency detection and invisible, precise control of hidden risks in massive digital transactions, earning top provincial honors and extensive industry adoption.

AI securityAwardDistributed Systems
0 likes · 5 min read
Ant Group and Tsinghua University’s Distributed Collaborative Risk‑Defense System Wins Zhejiang Provincial Science & Technology Progress Award
DataFunSummit
DataFunSummit
Nov 8, 2023 · Blockchain

Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank

This article presents WeBank's exploration of privacy‑computing technologies combined with blockchain to enable secure, compliant data flow across enterprises, detailing the regulatory background, technical architectures, key use‑case scenarios such as anonymous query, privacy intersection, joint prediction and statistics, and real‑world deployments including the 2022 Big Data “Star River” benchmark cases.

BlockchainPrivacy ComputingWeBank
0 likes · 16 min read
Privacy Computing and Blockchain Integration for Secure Data Flow: Practices and Case Studies by WeBank
AntTech
AntTech
Oct 20, 2023 · Information Security

Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification

The article describes how Ant Group and partners created an accessible online movie platform for visually impaired users in China, employing innovative privacy‑computing, blockchain, and terminal‑security technologies to enable secure, minimal‑disclosure identity verification and protect intellectual‑property rights.

Identity verificationPrivacy Computingaccessible media
0 likes · 6 min read
Digital Accessible Online Movie Service for the Visually Impaired: Privacy Computing, Blockchain, and Secure Identity Verification
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Aug 1, 2023 · Information Security

What the 2023 ACM China Turing Conference Revealed About AI‑Driven Security Challenges

The 2023 ACM China Turing Conference and the ACM TURC‑OPPO Security Summit in Wuhan gathered leading researchers and industry experts to discuss AI‑powered security, Bluetooth vulnerabilities, database fuzz testing, LLM‑enhanced mobile security, and proactive privacy computing, highlighting both breakthroughs and emerging risks.

AI securityBluetooth vulnerabilitiesLLM safety
0 likes · 8 min read
What the 2023 ACM China Turing Conference Revealed About AI‑Driven Security Challenges
AntTech
AntTech
Jul 27, 2023 · Information Security

Privacy Computing Cross‑Platform Interoperability Open Protocol v2.0 (ECDH‑PSI): Overview and Key Enhancements

The article introduces the privacy‑computing open protocol v2.0, explains its technical improvements such as flexible handshake options, point‑compression and ciphertext truncation, and highlights its role in enabling secure cross‑platform data fusion through widely accepted cryptographic algorithms.

ECDH-PSIInteroperabilityPrivacy Computing
0 likes · 6 min read
Privacy Computing Cross‑Platform Interoperability Open Protocol v2.0 (ECDH‑PSI): Overview and Key Enhancements
AntTech
AntTech
Jul 26, 2023 · Information Security

Ant Group and Nanyang Technological University Launch Collaboration on Private Set Intersection Privacy Computing

On July 25, Ant Group and Singapore's Nanyang Technological University announced a research partnership to advance Private Set Intersection (PSI) privacy‑computing technology using Ant's YinYu framework, aiming to improve secure machine‑learning and data‑analysis applications while aligning with regional data‑privacy initiatives.

Privacy Computinginformation securityntu
0 likes · 4 min read
Ant Group and Nanyang Technological University Launch Collaboration on Private Set Intersection Privacy Computing
DataFunTalk
DataFunTalk
Jul 19, 2023 · Artificial Intelligence

Privacy Computing Practices at China Construction Bank: From External Data Use to an Enterprise‑Grade Platform

This article details China Construction Bank's journey in privacy computing, covering the history of external data usage, early federated learning experiments, rapid demand growth, the construction of an enterprise‑grade privacy computing platform, its design principles, achievements, and future directions.

AIFederated LearningPrivacy Computing
0 likes · 14 min read
Privacy Computing Practices at China Construction Bank: From External Data Use to an Enterprise‑Grade Platform
AntTech
AntTech
Jul 14, 2023 · Information Security

Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework

The SS‑LR open protocol describes a secret‑sharing based logistic regression algorithm split into four layers—machine learning, secure operators, cryptographic protocol, and network transmission—enabling interoperable, privacy‑preserving data flow and secure multi‑party model training across institutions.

Privacy ComputingSS-LRdata security
0 likes · 7 min read
Open Privacy Computing Protocol SS‑LR: A Secret‑Sharing Based Logistic Regression Framework
AntTech
AntTech
Jul 13, 2023 · Information Security

Data Element Marketization: Balancing Security and Development with Privacy Computing and Trusted Cloud Infrastructure

The article outlines how the rapid marketization of data elements, driven by new AI-driven demands, requires robust security and privacy measures, highlighting Ant Group's multi‑layered approach—including policy alignment, confidential computing services, and cross‑cloud "Confidential Sky Computing"—to enable safe, trustworthy data circulation.

Privacy Computingartificial intelligencecloud computing
0 likes · 17 min read
Data Element Marketization: Balancing Security and Development with Privacy Computing and Trusted Cloud Infrastructure
AntTech
AntTech
Jul 7, 2023 · Information Security

SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability

The YinYu 1.0 release introduces an MVP deployment package for privacy‑computing beginners, expands the product, resource, and connectivity layers, adds the Kuscia orchestration framework, enhances algorithm, device, and cryptographic capabilities, and promotes full‑stack interoperability across platforms.

InteroperabilityKusciaMVP deployment
0 likes · 9 min read
SecretFlow’s YinYu 1.0 Release: New MVP Deployment Package, Expanded Architecture, and Full‑Stack Interoperability
AntTech
AntTech
Jul 7, 2023 · Information Security

Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”

At the 2023 World AI Conference summit, Ant Group unveiled its YinYu Open‑Source Framework 1.0 and the HyperEnclave financial‑grade TEE, detailing their technical features, industry‑wide standards contributions, and how they aim to boost the usability, security, and interoperability of privacy computing for AI applications.

AIAnt GroupPrivacy Computing
0 likes · 7 min read
Ant Group Announces Open‑Source Privacy Computing Framework “YinYu 1.0” and the First Domestic Financial‑Grade TEE Solution “HyperEnclave”
DataFunSummit
DataFunSummit
Jul 7, 2023 · Information Security

Exploration and Reflections on Interoperability of Privacy Computing

This article presents a comprehensive overview of privacy‑computing interoperability in the financial sector, covering background challenges, the Beijing FinTech Alliance’s collaborative project structure, an industry‑level framework with technical and requirement layers, sub‑topic research results, achieved milestones, and future outlook for standardisation and ecosystem building.

Industry standardsInteroperabilityPrivacy Computing
0 likes · 11 min read
Exploration and Reflections on Interoperability of Privacy Computing
AntTech
AntTech
Jul 6, 2023 · Industry Insights

Unlocking AI Value: Data Quality, Privacy, and Blockchain in the Smart Era

The article examines how high‑quality data, robust privacy protection, and blockchain‑enabled trust infrastructure are essential for unlocking the value of AI models, citing market forecasts, examples from smart‑car and fintech firms, and the growing Chinese big‑data market through 2026.

AIBig DataBlockchain
0 likes · 9 min read
Unlocking AI Value: Data Quality, Privacy, and Blockchain in the Smart Era
WeChat Backend Team
WeChat Backend Team
Jun 13, 2023 · Artificial Intelligence

Boosting Vertical Federated Learning: Optimizing Paillier Encryption & Model Stability

This article examines the challenges of data privacy in big‑data environments and presents a comprehensive approach to vertical federated learning, detailing framework optimizations, Paillier homomorphic encryption enhancements, PSI‑based feature selection, and adversarial learning techniques to improve model stability and deployment on a unified ML platform.

Federated LearningPaillier encryptionPrivacy Computing
0 likes · 19 min read
Boosting Vertical Federated Learning: Optimizing Paillier Encryption & Model Stability
AntTech
AntTech
Mar 29, 2023 · Information Security

Introducing SCQL: Secure Collaborative Query Language for Privacy-Preserving Data Analysis

SCQL, an open‑source Secure Collaborative Query Language built on multi‑party computation, enables SQL‑style privacy‑preserving data analysis for small‑to‑medium organizations by offering easy integration, fine‑grained column‑level access control, broad data‑source support, and optimized performance for collaborative queries.

Privacy ComputingSCQLSQL
0 likes · 6 min read
Introducing SCQL: Secure Collaborative Query Language for Privacy-Preserving Data Analysis
DataFunTalk
DataFunTalk
Mar 10, 2023 · Information Security

Data Security Management Practices and Future Outlook in a Large Commercial Bank

The article outlines a large commercial bank’s understanding of data security, shares its comprehensive management practices—including governance, lifecycle protection, technical support, and industry collaboration—and presents a forward‑looking perspective on future challenges and enhancements in data security.

Financial IndustryPrivacy Computingdata security
0 likes · 16 min read
Data Security Management Practices and Future Outlook in a Large Commercial Bank
DataFunSummit
DataFunSummit
Feb 15, 2023 · Information Security

Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping

The interview with Alibaba Cloud Datatrust chief architect Liang Aiping examines the early-stage adoption of privacy computing, highlighting low technical challenges in data sources, the gap between theory and engineering in algorithms, complex system management for interoperability, and key product considerations such as security, performance, cost, and deployment.

Privacy ComputingSystem Managementalgorithm evaluation
0 likes · 13 min read
Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping
DataFunSummit
DataFunSummit
Feb 12, 2023 · Information Security

Privacy Computing: Technical Routes Overview and Ant Group’s Contributions

This article introduces and compares major privacy computing technologies—including MPC, federated learning, TEE, and proxy MPC—evaluating them across security, development cost, operational cost, accuracy, performance, participant scale, control, hardware cost, and trust, and then outlines Ant Group’s privacy computing framework, applications, and standards work.

Ant GroupFederated LearningMPC
0 likes · 8 min read
Privacy Computing: Technical Routes Overview and Ant Group’s Contributions
DataFunTalk
DataFunTalk
Feb 11, 2023 · Information Security

Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping

The interview with Alibaba Cloud Datatrust architect Liang Aiping reveals that privacy computing is still in its early stage, facing technical challenges in data sources, algorithm theory‑engineering gaps, system management interoperability, and product trade‑offs, while outlining future trends toward cross‑platform interoperability and distributed computing.

InteroperabilityPrivacy ComputingSystem Management
0 likes · 13 min read
Challenges and Trends in Privacy Computing: Insights from Alibaba Cloud Datatrust Architect Liang Aiping
AntTech
AntTech
Dec 30, 2022 · Information Security

Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol

The 2022 Trusted Privacy Computing Summit announced and released the industry's first open white‑box protocol, the ECDH‑PSI interconnection protocol, detailing its design, implementation highlights, and open‑source availability to promote interoperable and secure privacy‑preserving data collaboration across platforms.

ECDH-PSIInteroperabilityPrivacy Computing
0 likes · 6 min read
Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol
DataFunSummit
DataFunSummit
Dec 27, 2022 · Blockchain

Financial Technology Testing Facilitates Secure Data Sharing in Finance

The article explains how emerging collaboration models, privacy‑computing and blockchain technologies, together with evolving regulations and industry standards, enable secure and compliant financial data sharing, describing the technical foundations, evaluation criteria, and practical testing practices that support trustworthy FinTech products.

BlockchainFederated LearningFinTech standards
0 likes · 22 min read
Financial Technology Testing Facilitates Secure Data Sharing in Finance
DataFunSummit
DataFunSummit
Dec 26, 2022 · Information Security

Privacy Computing in Digital Government: Background, Technical Roadmap, Case Studies, Challenges, and Recommendations

This article introduces the background, technical roadmap, real-world cases, implementation challenges, and suggested approaches for privacy computing in digital government, highlighting how secure multi‑party computation, federated learning, and trusted execution environments can enable safe data sharing.

Federated LearningPrivacy Computingdata security
0 likes · 18 min read
Privacy Computing in Digital Government: Background, Technical Roadmap, Case Studies, Challenges, and Recommendations
AntTech
AntTech
Dec 22, 2022 · Information Security

From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing

The article explores how the shift from plaintext data to fully encrypted "data‑in‑state" (密态) is reshaping data security, privacy‑preserving computation, regulatory compliance, and market commercialization, with insights from Ant Group’s VP Dr. Wei Tao on technology pathways, challenges, and future prospects.

Privacy Computingdata securityencrypted data
0 likes · 30 min read
From Plaintext to Data‑in‑Encryption: The Emerging Era of Data “密态” and Trusted Privacy Computing
DataFunSummit
DataFunSummit
Dec 18, 2022 · Information Security

Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group

This article explains Ant Group's privacy computing framework, covering its fundamental concepts, layered product architecture, and four concrete use‑cases in the medical sector—including insurance, hospitals, health commissions, and medical device manufacturers—demonstrating how secure multi‑party computation and federated learning enable data collaboration while preserving privacy.

Ant GroupFederated LearningPrivacy Computing
0 likes · 12 min read
Privacy Computing: Concepts, Product Architecture, and Medical Industry Applications by Ant Group
Tencent Tech
Tencent Tech
Dec 9, 2022 · Artificial Intelligence

How Tencent’s Angel PowerFL Team Dominated iDASH with Homomorphic Encryption

Tencent’s Angel PowerFL team clinched the iDASH homomorphic encryption champion and secured top spots in MPC and SGX tracks, showcasing innovative privacy‑preserving machine‑learning models, CKKS‑based encrypted inference, and a scalable SGX clustering solution that push the boundaries of secure computation.

Homomorphic EncryptionPrivacy ComputingiDASH
0 likes · 5 min read
How Tencent’s Angel PowerFL Team Dominated iDASH with Homomorphic Encryption
AntTech
AntTech
Dec 3, 2022 · Information Security

IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group

The IEEE Standards Association has officially launched the Trusted Enclave Computing (P3181) standard project, led by Ant Group with participation from Chinese research institutes and companies, aiming to define technical frameworks, security requirements, and guidelines for designing, developing, testing, and maintaining privacy-preserving computing systems.

IEEE StandardPrivacy ComputingTECC
0 likes · 4 min read
IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group
Zhongtong Tech
Zhongtong Tech
Nov 18, 2022 · Information Security

Data Security Insights from CIS 2022: Balancing Compliance and Business Growth

At the CIS 2022 Cybersecurity Innovation Conference in Shanghai, ZTO Express’s security chief shared practical strategies for data security governance, highlighting legal compliance, management vs. technical controls, and the emerging role of privacy computing in sustaining business operations.

Privacy Computingcompliancedata security
0 likes · 5 min read
Data Security Insights from CIS 2022: Balancing Compliance and Business Growth
DataFunSummit
DataFunSummit
Nov 5, 2022 · Information Security

TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance

The article introduces TECC, a privacy‑computing framework that balances security and performance by using trusted execution environments, data secret‑sharing, lightweight cryptographic protocols, and Rust‑based implementation to enable near‑plaintext speed for secure multi‑party machine learning and data analysis.

Privacy ComputingRustTECC
0 likes · 10 min read
TECC: A New Approach to Trusted Enclave Confidential Computing – Architecture, Security, and Performance
DataFunSummit
DataFunSummit
Oct 8, 2022 · Information Security

Exploring Privacy Computing Technologies in the Open Financial Ecosystem

This article provides a comprehensive overview of privacy computing—covering its background, key techniques such as MPC, TEE, federated learning, homomorphic encryption, and differential privacy—and examines how these technologies are applied in open financial ecosystems, including use cases, challenges, and future directions.

BlockchainFederated LearningPrivacy Computing
0 likes · 25 min read
Exploring Privacy Computing Technologies in the Open Financial Ecosystem
DataFunSummit
DataFunSummit
Sep 22, 2022 · Information Security

Privacy Computing Enables Secure Medical Data Sharing and Analysis

This presentation introduces how privacy‑preserving computation technologies such as federated learning, trusted execution environments, and cryptographic methods empower the secure flow, analysis, and value extraction of large‑scale medical health data while addressing de‑identification risks and regulatory constraints.

AIFederated LearningPrivacy Computing
0 likes · 19 min read
Privacy Computing Enables Secure Medical Data Sharing and Analysis
AntTech
AntTech
Sep 22, 2022 · Artificial Intelligence

SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations

The SecretFlow privacy‑computing open‑source framework announced its inclusion in the PPCA Open‑Source Working Group and launched version 0.7, adding multi‑party computation, federated learning, infrastructure upgrades, and documentation improvements to advance secure AI and data analytics.

AIFederated LearningMPC
0 likes · 7 min read
SecretFlow Open‑Source Privacy Computing Framework Releases Version 0.7 with Enhanced MPC, Federated Learning, and Performance Optimizations
DataFunSummit
DataFunSummit
Sep 19, 2022 · Artificial Intelligence

Privacy-Preserving Graph Learning and Recommendation: Techniques, Challenges, and Platform Overview

This article reviews the rapid development of privacy-preserving computation, explains its classification, discusses differential privacy, secure multi‑party computation, federated and split learning, and demonstrates how these techniques can be combined for graph learning and recommendation systems, culminating in a description of the JinZhiTa privacy‑computing platform.

Federated LearningPrivacy Computinggraph learning
0 likes · 20 min read
Privacy-Preserving Graph Learning and Recommendation: Techniques, Challenges, and Platform Overview
DataFunSummit
DataFunSummit
Sep 18, 2022 · Information Security

Privacy Computing and Blockchain: Enabling Secure Data Collaboration

This article explains how privacy computing technologies such as federated learning, multi‑party computation, and trusted execution environments, combined with blockchain, address data sharing challenges in the digital economy by protecting privacy, ensuring compliance, and enabling secure, trusted collaboration across enterprises and government agencies.

BlockchainConfidential ComputingPrivacy Computing
0 likes · 11 min read
Privacy Computing and Blockchain: Enabling Secure Data Collaboration
DataFunTalk
DataFunTalk
Sep 12, 2022 · Information Security

Understanding Provable Security in Privacy Computing and Differential Privacy

This article explains why privacy‑preserving computation requires provable security, describes how to define security assumptions, illustrates game‑based and simulation‑based proof techniques with Paillier homomorphic encryption and OT examples, and discusses how differential privacy can complement cryptographic guarantees while highlighting practical challenges.

Privacy Computingcryptographydifferential privacy
0 likes · 15 min read
Understanding Provable Security in Privacy Computing and Differential Privacy
AntTech
AntTech
Sep 3, 2022 · Information Security

Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

The Trusted Privacy Computing Summit at the 2022 World AI Conference gathered leading scholars and industry experts to discuss cryptographic techniques, data security, and the practical rollout of privacy‑computing technologies across finance, healthcare, and cross‑border data services, emphasizing responsible digital economy development.

AIPrivacy Computingcryptography
0 likes · 8 min read
Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions
DataFunSummit
DataFunSummit
Aug 7, 2022 · Artificial Intelligence

Vertical Federated Learning: Characteristics, Research Directions, and Performance Optimization

This article introduces federated learning, traces its evolution, compares horizontal and vertical federated learning, analyzes the unique computational traits of vertical FL, and presents practical performance‑optimization techniques such as offline computation, sparse‑data handling, communication compression, and homomorphic encryption integration.

Federated LearningPerformance OptimizationPrivacy Computing
0 likes · 13 min read
Vertical Federated Learning: Characteristics, Research Directions, and Performance Optimization
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Privacy ComputingTECCcryptography
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
AntTech
AntTech
Jul 26, 2022 · Information Security

Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview

TECC (Trusted‑Environment‑based Cryptographic Computing) combines trusted computing and cryptographic protocols to enable large‑scale, secure, high‑performance privacy‑preserving data analysis, offering superior security, reliability, cost‑effectiveness, and applicability across diverse multi‑party scenarios such as East‑West computing and joint risk control.

Privacy ComputingTECCcryptography
0 likes · 14 min read
Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview
AntTech
AntTech
Jul 21, 2022 · Information Security

Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders

In early July Ant Group announced the open‑source release of its trusted privacy‑computing framework “YinYu”, with Chinese Academy of Sciences academician Wang Xiaoyun and senior officials from the banking and telecom sectors discussing the technology’s security challenges, compliance issues, performance trade‑offs, and the broader impact of open‑source on data sharing and industry innovation.

Industry collaborationPrivacy Computingcryptography
0 likes · 8 min read
Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders
DataFunSummit
DataFunSummit
Jul 19, 2022 · Information Security

Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing

This article explores the limitations of current non‑fully homomorphic privacy computing techniques, traces the evolution of fully homomorphic encryption, examines its practical applications in finance and machine learning, and discusses engineering challenges, protocol choices, and implementation considerations for secure data processing.

Financial ApplicationsFully Homomorphic EncryptionPrivacy Computing
0 likes · 16 min read
Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing
AntTech
AntTech
Jul 15, 2022 · Information Security

Ant Group Open‑sources the Trusted Privacy Computing Framework “YinYu” and Outlines Its Role in the Emerging Data Confidentiality Era

Ant Group announced the open‑source release of its six‑year‑old trusted privacy computing framework “YinYu,” detailing the technical challenges of data element markets, the shift to data‑in‑confidential‑state, the framework’s layered architecture, rigorous security verification, compliance considerations, and its invitation to the community for collaborative development.

Ant GroupPrivacy ComputingSecure Data Sharing
0 likes · 15 min read
Ant Group Open‑sources the Trusted Privacy Computing Framework “YinYu” and Outlines Its Role in the Emerging Data Confidentiality Era
DataFunTalk
DataFunTalk
Jul 8, 2022 · Information Security

DataFun 2022 Summit on Privacy Computing and Data Security

DataFun's 2022 summit brings together leading experts from academia and industry to discuss privacy computing, federated learning, secure data sharing, and their applications across finance, healthcare, telecom, and blockchain, offering insights into technologies, standards, and real-world implementations that enable data utility while protecting privacy.

Big DataFederated LearningPrivacy Computing
0 likes · 43 min read
DataFun 2022 Summit on Privacy Computing and Data Security
AntTech
AntTech
Jun 29, 2022 · Information Security

Data Confidentiality Era: Development and Security – Highlights from Wei Tao’s 2022 Big Data Summit Speech

Wei Tao, Vice President of Ant Group, outlined the transition to a data‑confidentiality era, emphasizing the need for privacy‑computing security grading, technical requirements, and industry collaboration to safely circulate data as a new production factor in the post‑2022 big data landscape.

Data GovernancePrivacy Computingconfidential data
0 likes · 11 min read
Data Confidentiality Era: Development and Security – Highlights from Wei Tao’s 2022 Big Data Summit Speech
AntTech
AntTech
Jun 16, 2022 · Information Security

Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points

This article examines the rapid growth of privacy computing in China, outlining policy and market drivers, explaining key technologies such as secure multiparty computation, trusted execution environments, homomorphic encryption, differential privacy and federated learning, and discussing the legal, technical and ecosystem challenges that hinder its wider adoption.

Federated LearningHomomorphic EncryptionPrivacy Computing
0 likes · 11 min read
Privacy Computing: How Digital Technologies Address Privacy Protection Pain Points
AntTech
AntTech
Jun 10, 2022 · Information Security

Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances

Trusted-Environment-based Cryptographic Computing (TECC), an Ant Group innovation that combines cryptographic MPC/FL with full‑stack trusted execution, has secured a new patent and demonstrates 10‑ to 100‑fold speed improvements, enabling large‑scale encrypted data processing for privacy‑critical applications.

Privacy ComputingTECCcryptography
0 likes · 5 min read
Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances
AntTech
AntTech
May 30, 2022 · Information Security

Ant Group’s Technical Innovations: Green Computing, Trusted Mobile Anti‑Fraud Sandbox, Open‑Source Privacy Platform, OceanBase DB Competition, and Security Parallel Slice

This article highlights Ant Group’s recent technical achievements—including green carbon‑reduction scheduling, the AntDTX trusted privacy sandbox for mobile anti‑fraud, the open‑source YinYu privacy‑computing platform, the OceanBase database competition, and the Space5D security parallel‑slice architecture—showcasing their impact on sustainability, security, and open‑source collaboration.

Cloud NativePrivacy Computinganti-fraud
0 likes · 9 min read
Ant Group’s Technical Innovations: Green Computing, Trusted Mobile Anti‑Fraud Sandbox, Open‑Source Privacy Platform, OceanBase DB Competition, and Security Parallel Slice
AntTech
AntTech
Apr 26, 2022 · Information Security

Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations

The article explores the rapid growth of privacy computing in China, highlighting new data protection laws, a surge in patents, real‑world applications such as medical data sharing, and personal stories of Ant Group engineers who develop cutting‑edge cryptographic frameworks and champion interdisciplinary research.

AIAnt GroupPrivacy Computing
0 likes · 13 min read
Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations
AntTech
AntTech
Apr 8, 2022 · Artificial Intelligence

Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning

On March 29, the Beijing FinTech Industry Alliance published two white‑papers—‘Multi‑Party Secure Computation Financial Application Status and Implementation Guide’ and ‘Federated Learning Technology Financial Application White Paper’—detailing policies, standards, case studies, and recommendations for deploying privacy‑preserving AI technologies in the financial sector.

AIFederated LearningMPC
0 likes · 4 min read
Release of Financial Application Guidance for Multi‑Party Secure Computation and Federated Learning
AntTech
AntTech
Mar 30, 2022 · Information Security

Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality

The article examines how the rapid growth of industrial internet data demands robust privacy‑preserving technologies, outlines the regulatory backdrop, describes the technical challenges of achieving high performance, stability, low cost, flexibility and strong security, and proposes trusted privacy computing as a comprehensive solution for the emerging data‑confidentiality era.

AIIndustrial InternetPrivacy Computing
0 likes · 15 min read
Embracing Trusted Privacy Computing in the Era of Industrial Data Confidentiality
AntTech
AntTech
Feb 21, 2022 · Information Security

Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era

The article analyzes the shift from plaintext data exchange to a data‑confidentiality era, outlines regulatory drivers, describes technical challenges of privacy‑preserving computation, evaluates existing cryptographic approaches, and argues that trusted privacy computing is the most promising solution to meet performance, reliability, cost, applicability, and security requirements.

Privacy Computingcomplianceconfidential data
0 likes · 19 min read
Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era
Baidu Tech Salon
Baidu Tech Salon
Jan 25, 2022 · Artificial Intelligence

What AI Trends Will Shape 2022? Insights from Baidu Research

Amid post‑pandemic uncertainty, Baidu Research outlines 2022 AI breakthroughs—from large‑model advancements and cross‑modal knowledge enhancement to AI‑driven scientific discovery, privacy computing, quantum hardware, autonomous driving, green AI, and inclusive technologies—highlighting how these trends will reshape industries and society.

2022AIGreen AI
0 likes · 10 min read
What AI Trends Will Shape 2022? Insights from Baidu Research
Architects' Tech Alliance
Architects' Tech Alliance
Jan 9, 2022 · Industry Insights

What Are Alibaba DAMO Academy’s 2022 Top Ten Tech Trends Shaping the Future?

Alibaba DAMO Academy’s 2022 report identifies ten emerging technology trends—from AI‑driven scientific research and large‑model co‑evolution to silicon photonic chips, green‑energy AI, flexible perception robots, high‑precision medical navigation, universal privacy computing, star‑ground computing, cloud‑network‑edge fusion, and XR internet—detailing their impact and expected development over the next few years.

AIEdge ComputingPrivacy Computing
0 likes · 10 min read
What Are Alibaba DAMO Academy’s 2022 Top Ten Tech Trends Shaping the Future?
21CTO
21CTO
Dec 28, 2021 · Artificial Intelligence

What Are Alibaba DAMO Academy’s 2022 Top 10 Tech Trends Shaping the Future?

Alibaba DAMO Academy’s 2022 Top Ten Technology Trends report, based on analysis of millions of papers and patents, highlights emerging breakthroughs such as AI for Science, co‑evolution of large and small models, silicon photonics, AI‑driven green energy, privacy computing, star‑ground computing, cloud‑network‑edge fusion and XR internet, outlining their potential impact over the next few years.

Privacy ComputingSilicon PhotonicsXR
0 likes · 10 min read
What Are Alibaba DAMO Academy’s 2022 Top 10 Tech Trends Shaping the Future?
AntTech
AntTech
Dec 21, 2021 · Information Security

Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview

The article explains how combining hardware and software solutions can address the data‑lifecycle security and cryptographic performance challenges of privacy computing, describing the underlying technology stack, acceleration techniques, and the integrated privacy‑computing appliance released by Ant Group.

Hardware accelerationPrivacy Computingcryptography
0 likes · 13 min read
Hardware‑Software Integration Accelerates Privacy Computing: Technical Overview
Architects' Tech Alliance
Architects' Tech Alliance
Dec 19, 2021 · Cloud Computing

China Cloud Computing Market Overview and Emerging Trends (2020‑2025)

The article provides a comprehensive overview of the global and Chinese cloud computing markets, detailing 2020 market sizes for IaaS, PaaS and SaaS, forecasts growth to 2025, major Chinese vendors, Alibaba Cloud's profitability and chip development, as well as the convergence of cloud, security, zero‑trust and privacy‑computing technologies.

ChinaIaaSPaaS
0 likes · 10 min read
China Cloud Computing Market Overview and Emerging Trends (2020‑2025)
AntTech
AntTech
Dec 16, 2021 · Information Security

CNCC2021 Technical Forum – Security Challenges in Digital Transformation

CNCC2021’s technical forum, held on December 17, 2021, gathered leading academics and industry experts to discuss privacy computing, secure multiparty computation, AI-driven cybersecurity, single sign‑on privacy, Yao’s garbled circuits, and blockchain smart‑contract security, highlighting emerging risks and solutions for digital transformation.

AI securityDigital TransformationPrivacy Computing
0 likes · 11 min read
CNCC2021 Technical Forum – Security Challenges in Digital Transformation
DataFunTalk
DataFunTalk
Nov 30, 2021 · Information Security

Privacy-Preserving Computation for Multi‑Center Medical Research: Challenges, Techniques, and Yidu Cloud Solutions

This article explains the background and challenges of medical multi‑center research, introduces privacy‑preserving computation concepts such as data‑usable‑invisible techniques, multi‑party secure computation and federated learning, and details Yidu Cloud's architecture, solutions, and real‑world case studies.

Privacy ComputingYidu Cloudmedical data security
0 likes · 18 min read
Privacy-Preserving Computation for Multi‑Center Medical Research: Challenges, Techniques, and Yidu Cloud Solutions
21CTO
21CTO
Nov 23, 2021 · Information Security

Dynamic Data Security: Unlocking Data Value and Protecting Privacy in Banking

In a recent statement, ICBC’s CTO emphasizes that data, as a crucial production factor, derives its core value during use, urging dynamic data security and personal information protection, cross‑institution collaboration, regulated data markets, and safe cross‑border flows to support a healthy digital economy.

Data GovernancePrivacy Computingcross‑border data
0 likes · 3 min read
Dynamic Data Security: Unlocking Data Value and Protecting Privacy in Banking
AntTech
AntTech
Nov 19, 2021 · Information Security

Privacy Computing: Current Applications and Challenges in Finance, Healthcare, and Government

The 2021 China Internet Law Conference report shows that privacy‑preserving computation has begun pilot deployments in finance, medical and public‑sector domains, delivering fraud‑risk reduction, secure biomedical research, and collaborative power‑grid analytics, yet it remains in early stages and faces scalability, standards, and policy challenges.

Federated LearningPrivacy Computingdata security
0 likes · 7 min read
Privacy Computing: Current Applications and Challenges in Finance, Healthcare, and Government
DataFunTalk
DataFunTalk
Oct 24, 2021 · Artificial Intelligence

Privacy Computing: The Federated Three‑Stage FIRM Architecture and Its Industrial Applications

This article introduces the background of privacy computing, explains the FIRM (Federated system Interconnection Reference Model) three‑stage architecture, details key technologies such as the Ionic Bond communication framework and HeteroDeepFM, and showcases real‑world applications in marketing, risk control, and government sectors.

AI securityData CollaborationFIRM architecture
0 likes · 15 min read
Privacy Computing: The Federated Three‑Stage FIRM Architecture and Its Industrial Applications
DataFunSummit
DataFunSummit
Oct 23, 2021 · Artificial Intelligence

Privacy Computing: The Federated Learning Three‑Part FIRM Architecture and Its Industrial Applications

This article introduces the background of privacy computing, explains the three‑stage FIRM reference architecture for federated learning, describes key technologies such as the Ionic Bond communication framework and HeteroDeepFM, and showcases real‑world applications in marketing, risk control, and government sectors.

AI securityData CollaborationFIRM architecture
0 likes · 17 min read
Privacy Computing: The Federated Learning Three‑Part FIRM Architecture and Its Industrial Applications
AntTech
AntTech
Jun 25, 2021 · Information Security

2021 WAIC Privacy Computing Academic Exchange – Overview and Schedule

The 2021 World Artificial Intelligence Conference (WAIC) in Shanghai hosts a Privacy Computing Academic Exchange on July 8, featuring keynote speeches, panel discussions, paper and poster sessions on secure multi‑party computation, federated learning, and differential privacy, with calls for submissions and a detailed agenda.

AI ConferenceFederated LearningPrivacy Computing
0 likes · 6 min read
2021 WAIC Privacy Computing Academic Exchange – Overview and Schedule
Architects Research Society
Architects Research Society
Dec 3, 2020 · Artificial Intelligence

Gartner 2021 Top Strategic Technology Trends: AI Engineering, Distributed Cloud, Privacy Computing, and More

Gartner's 2021 strategic technology trends highlight the rise of behavior‑driven internet, total experience, privacy‑enhanced computing, distributed cloud, anywhere operation, security mesh, intelligent composable business, AI engineering, and hyper‑automation as key drivers for organizational resilience and growth.

AI EngineeringHyperautomationPrivacy Computing
0 likes · 10 min read
Gartner 2021 Top Strategic Technology Trends: AI Engineering, Distributed Cloud, Privacy Computing, and More