MacLane Wilkison: I first discovered proxy re-encryption while working on ZeroDB, an end-to-end encrypted database. We used it as a way to allow other people to query your encrypted data. It's a really bizarre technology that intuitively seems like it shouldn't be possible: taking data encrypted under one key and "transforming" or re-encrypting it such that it's encrypted under another key.
Q: What do you think a listener will get out of this this talk vs. other talks on distributed data processing and data versioning that they've previously heard?
About the Startups Track
The data-oriented Startups Track at DataEngConf features dozen of startups forging ahead with innovative approaches to data and new data technologies. We find the most interesting startups at the intersection of ML, AI, data infrastructure and new applications of data science and highlight them in technical talks by their CTOs and lead engineers who are building these platforms.