How does secure MPC differ from other privacy-enhancing technologies?
How does Secure Multi-Party Computation differ from Trusted Execution Environments and Fully Homomorphic Encryption?
Many of you have asked for a side-by-side comparison between different technologies that enhance privacy.
Our CTO & co-founder Niek J. Bouman wrote a paper on:
- The working of the different technologies
- Strengths and limitations of each approach
- Considerations around performance and deployment
On top of that, he also provides a unique insight into our rationale of adopting MPC as the core technology in the Virtual Data Lake product.
This paper is a great read for anyone who is interested in diving deeper into PETs.
