NTSC | New Techniques for Secure Computation

Summary
Secure computation is a general-purpose tool for processing sensitive data without compromising its
confidentiality or integrity. In recent years, significant research efforts have been invested in optimizing
and implementing secure computation protocols and related cryptographic primitives such as fully
homomorphic encryption and program obfuscation.
The proposed project will explore new techniques for secure computation and related primitives.
The new techniques are expected to enhance the asymptotic and concrete efficiency of current solutions
and extend the known relations between secure computation and other problems in cryptography and
computational complexity theory. The research will span the following directions:
• Succinct secure computation via homomorphic secret sharing, exploring new research directions
that were opened by recent works of the PI;
• Protecting protocols against malicious parties, with relevance to efficient general-purpose program
obfuscation;
• Protecting protocols against general information leakage
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/742754
Start date: 01-10-2017
End date: 30-09-2023
Total budget - Public funding: 1 903 833,00 Euro - 1 903 833,00 Euro
Cordis data

Original description

Secure computation is a general-purpose tool for processing sensitive data without compromising its
confidentiality or integrity. In recent years, significant research efforts have been invested in optimizing
and implementing secure computation protocols and related cryptographic primitives such as fully
homomorphic encryption and program obfuscation.
The proposed project will explore new techniques for secure computation and related primitives.
The new techniques are expected to enhance the asymptotic and concrete efficiency of current solutions
and extend the known relations between secure computation and other problems in cryptography and
computational complexity theory. The research will span the following directions:
• Succinct secure computation via homomorphic secret sharing, exploring new research directions
that were opened by recent works of the PI;
• Protecting protocols against malicious parties, with relevance to efficient general-purpose program
obfuscation;
• Protecting protocols against general information leakage

Status

CLOSED

Call topic

ERC-2016-ADG

Update Date

27-04-2024
Images
No images available.
Geographical location(s)
Structured mapping
Unfold all
/
Fold all
Horizon 2020
H2020-EU.1. EXCELLENT SCIENCE
H2020-EU.1.1. EXCELLENT SCIENCE - European Research Council (ERC)
ERC-2016
ERC-2016-ADG