LogoLogo
search
⌘Ctrlk
LogoLogo
  • Nesa Docs
    • Introduction to Nesa
    • 1Why Nesa Represents the Future of the AI Economy
    • 2Why Centralized AI Infrastructure Is Broken
    • 3Why Decentralized AI Has Not Worked (Yet)
    • Organization of the Documentation
  • Background and Exploratory Notes
  • Major Innovations
    • 1Private Inference for AI
      • Why Privacy Matters in Decentralized AI
      • Practical Approach: Equivariant Encryption (EE)
      • Scalable Private Inference with HSS-EE
      • Background and Exploratory Notes
        • Hardware Side: Trusted Execution Environments (TEEs)
        • Software/algorithm Side: Data Encryption
        • Software/algorithm Side: Model Verification
        • Privacy Technology
          • Trusted Execution Environment (TEE)
          • Secure Multi-Party Computation (MPC)
          • Verifiable Random Function (VRF)
          • Zero-Knowledge Proof (ZKP)
    • 2Decentralized Execution for AI
    • 3AI Link: Cross-chain Access for AI
    • $NES Utility
    • Background and Exploratory Notes
  • Using Nesa
    • Getting Started
    • Via Web
    • Via SDK
    • Via IBC
  • Run a Nesa Node
    • Prerequisites
    • Installation
    • Troubleshooting
    • FAQ
  • Additional Read
  • Links
    • nesa.aiarrow-up-right
    • Nesa Playgroundarrow-up-right
    • Nesa Chain Explorerarrow-up-right
    • Nesa EVM Explorerarrow-up-right
    • Nesa Discordarrow-up-right
    • Nesa Twitterarrow-up-right
    • Terms of Servicearrow-up-right
    • Privacy Policyarrow-up-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Major Innovationschevron-right
  2. 1Private Inference for AIchevron-right
  3. Background and Exploratory Notes

Privacy Technology

This section provides a deeper look at some of the security and privacy technologies mentioned throughout the book.

Trusted Execution Environment (TEE)chevron-rightSecure Multi-Party Computation (MPC)chevron-rightVerifiable Random Function (VRF)chevron-rightZero-Knowledge Proof (ZKP)chevron-right
PreviousConsensus-based Distribution Verification (CDV)chevron-leftNextTrusted Execution Environment (TEE)chevron-right

Last updated 1 month ago