SPICS Lab

Optimizations for Privacy Enhancing Techniques

High-Level Architecture of PP-AI System

  A major barrier to the adoption of privacy-preserving computing is usability. Currently, implementing systems that utilize PETs requires deep domain expertise in cryptography and hardware security. If you are not yet familiar with PETs but are interested in, I suggest you read this page first. Software developers who simply want to build a secure application are forced to manually manage cryptographic keys, handle ciphertext memory limits, and rewrite their standard code into highly constrained formats.

  Our ultimate vision is a unified platform that abstracts away this complexity. We aim to build intelligent compilers, automated frameworks, and hybrid architectures that allow developers to write “normal” unencrypted code, which the system automatically translates into secure, privacy-preserving executions. By integrating various PETs seamlessly, we can choose the right tool for the right job—balancing security, privacy, and speed autonomously.

  As other systems are, PET computing systems also consist of several layers, the front-end that transpiles a general code into a PET applied code,


Key Sub-Topics & Keywords

To give you an idea of potential topics you may be interested in (but not bounded to):

  1. FHE Compilers and Schedulers
  2. Integrating multiple PETs (e.g., FHE+MPC+TEE)
  3. Mitigating Side-Channel Attacks on TEEs
  4. Real-Time Privacy Monitoring Techniques

Student Note: A lot of organizations are highly interested (some are actively hiring) Privacy Enhancing Techniques researchers – Google, Microsoft, Samsung Electronics, LG Electronics, Thales, and much more. If you are interested in studying about data privacy issues in different AI applications as well as how to overcome the limitations of PETs, this field is for you.

Previous post
Privacy-Preserving AI as a Service (PPAI)