SecAppDev 2025 lecture details
COED Technologies: what they can and can't do
MPC, FHE and ZKP are complementary COED technologies that provide different flavours of confidentiality and verifiability within different trust settings and threat models. Often, neither one of them is a miracle solution alone.
Tuesday June 3th, 11:00 - 12:30
Room Lemaire
Abstract
Computing On Encrypted Data is a recent technology providing security properties such as confidentiality, integrity or verifiability to data is use (as opposed to data at rest or in transit).
This session will discuss technologies such as multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZKPs) to present the guaranties that they can (and can't) provide, the settings and assumptions that they require, and some application examples from recent years.
Key takeaway
Preserving data confidentiality during computation is a real-world possibility given the right choice and combination of COED tools.
Content level
Introductory
Target audience
Software and systems engineers looking to build privacy-preserving solutions
Prerequisites
Some intuitive understanding of security concepts such as confidentiality, verifiability, encryption and the like.
Join us for SecAppDev. You will not regret it!
Grab your seat now
Cyprien de Saint Guilhem
Head of R&D, 3MI Labs
Expertise: Cryptography research and transfer engineering
Join us for SecAppDev. You will not regret it!
Grab your seat nowRelated lectures
Threat Modeling for Intimate Partner Abuse
Introductory lecture by Eva Galperin in room Lemaire
Monday June 2rd, 09:15 - 10:30
Most developers don't think of protection against domestic abusers as part of a product's security and they should.
Key takeaway: The intimate partner abuse threat model is different other models in important and unexpected ways.
Verifiable Credentials: Concepts to Practice
Introductory lecture by Kristina Yasuda in room Lemaire
Monday June 2rd, 14:00 - 15:30
A technical introduction to Verifiable Credentials, highlighting use cases, implementation lessons, interoperability profiles, and recent updates to the related specifications.
Key takeaway: Interoperability in the wallet model requires aligned choices across the stack that meet use case requirements in terms of UX, security, privacy, etc.
The Engineer’s Guide to Data Privacy
Deep-dive lecture by Vera Rimmer in room Lemaire
Wednesday June 4th, 14:00 - 15:30
In this session we will walk through the engineer’s toolbox for protecting different types of data against common privacy threats. The talk is informed by existing practical tools as well as by modern research on data privacy.
Key takeaway: Privacy is an engineering responsibility, not only a legal or design issue. Privacy-preserving techniques are accessible and implementable today.