LogoLogo
search
Ctrlk
  • Nesa Docs
    • Introduction to Nesa
    • 1Why Nesa Represents the Future of the AI Economy
    • 2Why Centralized AI Infrastructure Is Broken
    • 3Why Decentralized AI Has Not Worked (Yet)
    • Organization of the Documentation
  • Background and Exploratory Noteschevron-right
  • Major Innovations
    • 1Private Inference for AIchevron-right
      • Why Privacy Matters in Decentralized AI
      • Practical Approach: Equivariant Encryption (EE)
      • Scalable Private Inference with HSS-EE
      • Background and Exploratory Noteschevron-right
        • Hardware Side: Trusted Execution Environments (TEEs)chevron-right
        • Software/algorithm Side: Data Encryptionchevron-right
        • Software/algorithm Side: Model Verificationchevron-right
        • Privacy Technologychevron-right
          • Trusted Execution Environment (TEE)
          • Secure Multi-Party Computation (MPC)
          • Verifiable Random Function (VRF)
          • Zero-Knowledge Proof (ZKP)
    • 2Decentralized Execution for AIchevron-right
    • 3AI Link: Cross-chain Access for AIchevron-right
    • $NES Utility
    • Background and Exploratory Noteschevron-right
  • Using Nesa
    • Getting Startedchevron-right
    • Via Webchevron-right
    • Via SDK
    • Via IBC
    • Via NESBridgechevron-right
  • Run a Nesa Node
    • Prerequisites
    • Installation
    • Troubleshooting
    • FAQ
  • Additional Read
  • Links
    • nesa.aiarrow-up-right-from-square
    • Nesa Playgroundarrow-up-right-from-square
    • Nesa Chain Explorerarrow-up-right-from-square
    • Nesa EVM Explorerarrow-up-right-from-square
    • Nesa Discordarrow-up-right-from-square
    • Nesa Twitterarrow-up-right-from-square
    • Terms of Servicearrow-up-right-from-square
    • Privacy Policyarrow-up-right-from-square
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Major Innovationschevron-right
  2. 1Private Inference for AIchevron-right
  3. Background and Exploratory Notes

Privacy Technology

This section provides a deeper look at some of the security and privacy technologies mentioned throughout the book.

Trusted Execution Environment (TEE)chevron-rightSecure Multi-Party Computation (MPC)chevron-rightVerifiable Random Function (VRF)chevron-rightZero-Knowledge Proof (ZKP)chevron-right
PreviousConsensus-based Distribution Verification (CDV)chevron-leftNextTrusted Execution Environment (TEE)chevron-right

Last updated 28 days ago