Tag

trusted execution

1 views collected around this technical thread.

AntTech
AntTech
Jul 26, 2022 · Information Security

Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview

TECC (Trusted‑Environment‑based Cryptographic Computing) combines trusted computing and cryptographic protocols to enable large‑scale, secure, high‑performance privacy‑preserving data analysis, offering superior security, reliability, cost‑effectiveness, and applicability across diverse multi‑party scenarios such as East‑West computing and joint risk control.

Data SecurityTECCcryptography
0 likes · 14 min read
Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview
AntTech
AntTech
Jul 15, 2022 · Information Security

Ant Group Open‑sources the Trusted Privacy Computing Framework “YinYu” and Outlines Its Role in the Emerging Data Confidentiality Era

Ant Group announced the open‑source release of its six‑year‑old trusted privacy computing framework “YinYu,” detailing the technical challenges of data element markets, the shift to data‑in‑confidential‑state, the framework’s layered architecture, rigorous security verification, compliance considerations, and its invitation to the community for collaborative development.

Ant GroupOpen SourceSecure Data Sharing
0 likes · 15 min read
Ant Group Open‑sources the Trusted Privacy Computing Framework “YinYu” and Outlines Its Role in the Emerging Data Confidentiality Era
AntTech
AntTech
Jun 10, 2022 · Information Security

Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances

Trusted-Environment-based Cryptographic Computing (TECC), an Ant Group innovation that combines cryptographic MPC/FL with full‑stack trusted execution, has secured a new patent and demonstrates 10‑ to 100‑fold speed improvements, enabling large‑scale encrypted data processing for privacy‑critical applications.

TECCcryptographyprivacy computing
0 likes · 5 min read
Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances
AntTech
AntTech
Feb 21, 2022 · Information Security

Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era

The article analyzes the shift from plaintext data exchange to a data‑confidentiality era, outlines regulatory drivers, describes technical challenges of privacy‑preserving computation, evaluates existing cryptographic approaches, and argues that trusted privacy computing is the most promising solution to meet performance, reliability, cost, applicability, and security requirements.

Data Securitycomplianceconfidential data
0 likes · 19 min read
Trusted Privacy Computing: A Key Technology for the Emerging Data Confidentiality Era