Abstract
rforming joint computations on data coming from different data owners offers great potential for more efficient resource use, cost reductions, a reduction in certain industry's carbon footprint and improved societal benefits.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
Originalsprache | Englisch |
---|---|
Seiten (von - bis) | 17-18 |
Seitenumfang | 2 |
Fachzeitschrift | ERCIM News |
Volume | 133 |
Publikationsstatus | Veröffentlicht - 28 Apr. 2023 |
Research Field
- Cyber Security