Outsourced Computations Maintaining Confidentiality and Authenticity

Publikation: Beitrag in FachzeitschriftArtikel


rforming joint computations on data coming from different data owners offers great potential for more efficient resource use, cost reductions, a reduction in certain industry's carbon footprint and improved societal benefits.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
Seiten (von - bis)17-18
FachzeitschriftERCIM News
PublikationsstatusVeröffentlicht - 28 Apr. 2023

Research Field

  • Cyber Security


Untersuchen Sie die Forschungsthemen von „Outsourced Computations Maintaining Confidentiality and Authenticity“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren