Abstract
Secure computation allows collaborative computations with enforced privacy. Continued research and increasingly larger real-world deployments suggest that anyone looking for privacy-preserving computing technology should keep an eye on secure computation's development.
Original language | English |
---|---|
Article number | 7676176 |
Pages (from-to) | 48-56 |
Number of pages | 9 |
Journal | IEEE Security and Privacy |
Volume | 14 |
Issue number | 5 |
DOIs | |
State | Published - 1 Sep 2016 |
Bibliographical note
Publisher Copyright:© 2016 IEEE.
Funding
This material is based on work supported by DARPA and the Office of Naval Research under contract N00014-11-C-0333. Any opinions, findings, and conclusions or recommendations expressed in this material are the authors' and don't necessarily reflect DARPA's views. In addition, the EU Seventh Framework Programme (FP7/2007-2013) under grant agreement 609611 (PRACTICE) and the Estonian Research Council under grant IUT27-1 funded research leading to these results.
Funders | Funder number |
---|---|
FP7/2007 | 609611 |
Office of Naval Research | N00014-11-C-0333 |
Defense Advanced Research Projects Agency | |
Eesti Teadusagentuur | IUT27-1 |
Seventh Framework Programme |
Keywords
- homomorphic cryptography
- performance
- privacy
- secure computing
- security