skip to content



Tuesday 19th January 2021



Companies have been repeatedly told that data is one of their most valuable commodities, but realising the full value of that data may require re-mixing, comparison, or computation against data held by others.  Unfortunately, sharing data is one of the hardest things for companies to do, because of the perceived commercial and legal risks. Even within a single organisation, sharing data can be considered to create large security or privacy risks.

The last few years have seen the emergence of technologies which allow for the secure collection, sharing, processing, and storage of data without the downsides of reducing privacy of users, or compromising corporate security. These Privacy Enhancing Technologies (PETs) have the capacity to make data sharing both safe and effective. These technologies form the basis of various new ways of doing business, with many being highlighted in recent Gartner reports as opening up new ways of exploiting data.

Now is the time to look further at case studies, models and demonstrators that show such techniques can perform what at first sight seems impossible: to process data without seeing it. The technology is so counterintuitive, and opens up such new ways of working, that we have identified a need to facilitate a greater understanding of these technologies amongst end-users, without them necessarily needing to know exactly “how” it works. 

Aims and Objectives

Developed with academic partners and in collaboration with the Digital Catapult, this events series recognised the need to help business and industry find effective ways to utilise these new privacy enhancing technologies. Therefore, these events were of interest to anyone in business and industry who had a need to share and/or process data securely, as well as those focused on corporate CyberSecurity.

Events 1-3 featured talks from experts from companies developing these technologies. The talks highlighted why PET technologies can be trusted and how they enable the value in data to be unlocked; without needing to compromise on the privacy or security of the said data. They also highlighted how users can go about exploring and running tests on them, across a range of potential application domains, from inter- to intra- company security.

We had five different discussions, in each of which Nigel Smart (KU Leuven) hosted and asked questions of each of the different guests.


Thursday 19th November 2020, 14.00-15.15 

Watch the video here

Multiparty computation (MPC) – Dan Bogdanov (Cybernetica) 

A sub-field of cryptography which has been applied to many use cases with potential applications in long-term shared data governance. Current deployed applications ranging from data sharing within organisations through to securing an organizations internal infrastructure..

Monday 30th November 2020, 10.00-11.15

Watch the video here

Fully Homomorphic Encryption schemes (FHE) – Rand Hindi (Zama)

A form of encryption which allows computations on encrypted data.

Tuesday 8th December 2020, 14.00-15.15


Watch the video here

Zero knowledge proofs (ZK proofs) – Eli Ben Sasson (Starkware)

A cryptographic technology that allows one party to prove a statement to another, without the need to reveal the actual values being proven. Such technology forms the basis of many new applications in distributed ledgers/blockchain.


Tuesday 15th December 2020, 10.00-11.15

Watch the video here

End-User Perspectives – Mark Craddock (GCATI) and Matt Lowe (Financial Conduct Authority)

Perspectives from end-users considering using PETs and what the potential challenges for implementing the technology might be. To include discussion of the work of the UN Privacy Preserving Techniques Task Team from the BigData UN Global
Working Group on a secure data policy framework. There will also be insights into PETs in the financial sector, such as how they cans can facilitate the sharing of information about money laundering and financial crime concerns, while remaining compliant with data security laws.

Tuesday 19th January 2021, 10.00-11.15

Watch the video here

PETs from an Investors Perspective - Lawrence Lundy (Lunar Ventures), Yuval Shachar (Team 8), Alex van Someren (Amadeus Capital Partners)

This discussion will feature investors perspectives on near term future opportunities and developments for privacy enhancing technologies

Registration and Venue

The workshops took place virtually via Zoom.

Working with Digital Catapult

Co-Host and Catapult (each a “Host”) are co-hosting this event, and each Host is individually (not jointly) a Controller.  Each Host is individually responsible to you for how that Host respectively stores, uses and processes your personal data in accordance with that Host’s privacy policy. One Host is not responsible to you for the other Host’s storage, use or processing of your data.  Actions taken by one Host (e.g. deleting personal data) will be independent of the other Host. If you need to make a data request, please make such request directly to the relevant Host(s).  Each Host’s privacy policy can be found at Co-Host: and Catapult [].
The Co-Host and/or the Catapult may take photographs and/or video at the event, which will be used in general promotional material recording or relating to the event, including use with websites, emails, social media and tangible literature.  If you have any concerns relating to this, please contact the events coordinator at the Event.

Industry Groups:
Crowdcast series about STARKs:
Links from Tuesday 15th December:

Unbound Tech



In Partnership with