Tagged articles
6 articles
Page 1 of 1
AntTech
AntTech
Nov 29, 2024 · Artificial Intelligence

AI Inference with Trusted Execution Environment: HyperGPU and DistMSM Accelerated Zero‑Knowledge Proofs Win 2024 Financial Cipher Cup Innovation Award

The award‑winning solution combines a GPU‑accelerated TEE framework (HyperGPU) and a multi‑GPU zkSNARK acceleration scheme (DistMSM) to provide fast, privacy‑preserving AI inference proofs, earning the third‑place Innovation Team prize at the 2024 Financial Cipher Cup competition.

AIDistMSMFinancial Cipher
0 likes · 6 min read
AI Inference with Trusted Execution Environment: HyperGPU and DistMSM Accelerated Zero‑Knowledge Proofs Win 2024 Financial Cipher Cup Innovation Award
AntTech
AntTech
Mar 31, 2023 · Artificial Intelligence

Web Photo Source Identification Based on Neural Enhanced Camera Fingerprint

This paper presents a neural‑enhanced camera fingerprint framework combined with zero‑knowledge proof and digital signature schemes to reliably trace the originating device of photos, offering high‑accuracy identification, privacy preservation, and resistance to forgery across various application scenarios.

Neural NetworkZero Knowledge Proofcamera fingerprint
0 likes · 8 min read
Web Photo Source Identification Based on Neural Enhanced Camera Fingerprint
dbaplus Community
dbaplus Community
Oct 20, 2019 · Blockchain

Can Blockchain Solve Privacy Risks? From GDPR to Zero‑Knowledge Proofs

The talk outlines how recent privacy regulations like GDPR expose data sovereignty, jurisdiction, and fines, then explains how blockchain’s distributed ledger, consensus, smart contracts, and cryptographic techniques—including homomorphic encryption and zero‑knowledge proofs—address trust gaps and privacy challenges, illustrated with real‑world financial use cases and a telecom‑backed BaaS platform.

BaaSFinancial ServicesGDPR
0 likes · 23 min read
Can Blockchain Solve Privacy Risks? From GDPR to Zero‑Knowledge Proofs
UCloud Tech
UCloud Tech
May 25, 2018 · Information Security

How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive

An in‑depth overview explains how blockchain, homomorphic encryption, zero‑knowledge proofs, group and ring signatures, and differential privacy collectively secure data flow, enabling trusted sharing while preserving ownership and privacy across providers, consumers, and algorithm services.

BlockchainData FlowHomomorphic Encryption
0 likes · 11 min read
How Blockchain and Advanced Cryptography Secure Data Flow: A Deep Dive
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Dec 28, 2017 · Information Security

How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic

This article demystifies HTTPS by explaining its underlying encryption, signing, and certificate mechanisms, illustrating how zero‑knowledge proof concepts secure identity verification, and providing practical guidance on upgrading from HTTP, configuring certificates, capturing traffic with Fiddler, and understanding session recovery and performance considerations.

CertificateFiddlerHTTPS
0 likes · 11 min read
How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic