Abstract
rforming joint computations on data coming from different data owners offers great potential for more efficient resource use, cost reductions, a reduction in certain industry's carbon footprint and improved societal benefits.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
However, these synergies are often not exploited because stakeholders have high confidentiality requirements for business-sensitive data and are distrusting of each other. To address this gap, in a series of projects, we have developed provably privacy-preserving and verifiable protocols
based on multi-party computation.
Original language | English |
---|---|
Pages (from-to) | 17-18 |
Number of pages | 2 |
Journal | ERCIM News |
Volume | 133 |
Publication status | Published - 28 Apr 2023 |
Research Field
- Cyber Security