IP Protection and Privacy in LLM: Leveraging Fully Homomorphic Encryption

Subscribers:
98,700
Published on ● Video Link: https://www.youtube.com/watch?v=lmIgGD8csy0



Duration: 43:41
291 views
7


Presenters:
Benoit Chevallier-Mames, VP of Cloud and Machine Learning, Zama
Jordan Frery, Research Scientist, Zama

Large Language Models (LLMs) are increasingly utilized in various applications. However, there's a dilemma between safeguarding the model owner's assets and ensuring the user's data privacy. This session introduces a hybrid method that employs Fully Homomorphic Encryption to address both these concerns. Presenting a live demonstration of the approach, highlighting its practicality and efficiency.

https://www.rsaconference.com/usa




Other Videos By RSA Conference


2024-07-03Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26Fianu Pitch - RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-26RSAC 365 Innovation Showcase: Building a Holistic Approach to DevSecOps
2024-06-25Leadership Panel - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Traditional Sessions - RSAC 365 Virtual Seminar: Infrastructure Security
2024-06-25Closing Celebration with Alicia Keys
2024-06-25RSA Conference 2024 Opening Keynote
2024-06-25Exploring the Universe, Quantum Bit by Quantum Bit
2024-06-25Webcast Clip: NIST Cybersecurity Framework v2.0, explained
2024-06-17Webcast: Full-Circle Zero Trust: Ensuring No App is Left Behind in your IAM Strategy
2024-06-10IP Protection and Privacy in LLM: Leveraging Fully Homomorphic Encryption
2024-06-10Agents of Chaos: Hacktivism Spreads Fear, Disinformation, and Propaganda
2024-06-10Navigating M&A Security Challenges: A Deep Dive into a Case Study
2024-06-10How AI Is Changing the Malware Landscape
2024-06-10My Resilient Career: How to Do More than Just Survive in Security
2024-06-10Key Management 101: DEKs, KEKs, and Credentials Living Together, Oh My!
2024-06-10Detecting Website Intrusion and Account Compromise with Machine Learning
2024-06-10The End of DevSecOps?
2024-06-10AI: Law, Policy, and Common Sense Suggestions to Stay Out of Trouble
2024-06-10All You Need Is Guest
2024-06-10DPAPI and DPAPI-NG: Decrypting All Users’ Secrets and PFX Passwords



Tags:
rsa
rsaconference
rsac
information
security
cybersecurity
infosec