Outsourced Computations Maintaining Confidentiality and Authenticity

Research output: Contribution to journalArticle

Abstract

rforming joint computations on data coming from different data owners offers great potential for more efficient resource use, cost reductions, a reduction in certain industry's carbon footprint and improved societal benefits.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
Original languageEnglish
Pages (from-to)17-18
Number of pages2
JournalERCIM News
Volume133
Publication statusPublished - 28 Apr 2023

Research Field

  • Cyber Security

Fingerprint

Dive into the research topics of 'Outsourced Computations Maintaining Confidentiality and Authenticity'. Together they form a unique fingerprint.

Cite this