Spaces:
Build error
Build error
chore: fix typo
Browse files
app.py
CHANGED
|
@@ -513,7 +513,7 @@ with demo:
|
|
| 513 |
|
| 514 |
<p align="center" style="font-size: 16px;">
|
| 515 |
In the example above, we're showing how encrypted anonymization can be leveraged to use LLM
|
| 516 |
-
services such as
|
| 517 |
"""
|
| 518 |
)
|
| 519 |
|
|
@@ -532,7 +532,7 @@ with demo:
|
|
| 532 |
"## Step 1: Generate the keys\n\n"
|
| 533 |
"""In Fully Homomorphic Encryption (FHE) methods, two types of keys are created. The first
|
| 534 |
type, called secret keys, are used to encrypt and decrypt the user's data. The second type,
|
| 535 |
-
called evaluation keys,
|
| 536 |
actual data.
|
| 537 |
"""
|
| 538 |
)
|
|
|
|
| 513 |
|
| 514 |
<p align="center" style="font-size: 16px;">
|
| 515 |
In the example above, we're showing how encrypted anonymization can be leveraged to use LLM
|
| 516 |
+
services such as ChatGPT in a privacy-preserving manner.</p>
|
| 517 |
"""
|
| 518 |
)
|
| 519 |
|
|
|
|
| 532 |
"## Step 1: Generate the keys\n\n"
|
| 533 |
"""In Fully Homomorphic Encryption (FHE) methods, two types of keys are created. The first
|
| 534 |
type, called secret keys, are used to encrypt and decrypt the user's data. The second type,
|
| 535 |
+
called evaluation keys, enables a server to work on the encrypted data without seeing the
|
| 536 |
actual data.
|
| 537 |
"""
|
| 538 |
)
|