Optimizations for Privacy Enhancing Techniques

A major barrier to the adoption of privacy-preserving computing is usability. Currently, implementing systems that utilize PETs requires deep domain expertise in cryptography and hardware security. If you are not yet familiar with PETs but are interested in, I suggest you read this page first. Software developers who simply want to build a secure application are forced to manually manage cryptographic keys, handle ciphertext memory limits, and rewrite their standard code into highly constrained formats.
Our ultimate vision is a unified platform that abstracts away this complexity. We aim to build intelligent compilers, automated frameworks, and hybrid architectures that allow developers to write “normal” unencrypted code, which the system automatically translates into secure, privacy-preserving executions. By integrating various PETs seamlessly, we can choose the right tool for the right job—balancing security, privacy, and speed autonomously.
As other systems are, PET computing systems also consist of several layers, the front-end that transpiles a general code into a PET applied code,
- “Privacy-Enhancing Compilers:” Developing automated tools that translate standard plaintext code into optimized cryptographic circuits or TEE-compatible binaries.
- “Unified PET Platforms:” Creating middleware that dynamically orchestrates different privacy techniques (combining FHE and TEEs) based on the specific security and performance requirements of the task.
- “Developer-Friendly Security:” Designing APIs and frameworks that hide mathematical complexity while mathematically guaranteeing data protection.
Key Sub-Topics & Keywords
To give you an idea of potential topics you may be interested in (but not bounded to):
- FHE Compilers and Schedulers
- Integrating multiple PETs (e.g., FHE+MPC+TEE)
- Mitigating Side-Channel Attacks on TEEs
- Real-Time Privacy Monitoring Techniques
Student Note: A lot of organizations are highly interested (some are actively hiring) Privacy Enhancing Techniques researchers – Google, Microsoft, Samsung Electronics, LG Electronics, Thales, and much more. If you are interested in studying about data privacy issues in different AI applications as well as how to overcome the limitations of PETs, this field is for you.