Maturity and Performance of Programmable Secure Computation

David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

Secure computation allows collaborative computations with enforced privacy. Continued research and increasingly larger real-world deployments suggest that anyone looking for privacy-preserving computing technology should keep an eye on secure computation's development.

Original languageEnglish
Article number7676176
Pages (from-to)48-56
Number of pages9
JournalIEEE Security and Privacy
Volume14
Issue number5
DOIs
StatePublished - 1 Sep 2016

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Funding

This material is based on work supported by DARPA and the Office of Naval Research under contract N00014-11-C-0333. Any opinions, findings, and conclusions or recommendations expressed in this material are the authors' and don't necessarily reflect DARPA's views. In addition, the EU Seventh Framework Programme (FP7/2007-2013) under grant agreement 609611 (PRACTICE) and the Estonian Research Council under grant IUT27-1 funded research leading to these results.

FundersFunder number
FP7/2007609611
Office of Naval ResearchN00014-11-C-0333
Defense Advanced Research Projects Agency
Eesti TeadusagentuurIUT27-1
Seventh Framework Programme

    Keywords

    • homomorphic cryptography
    • performance
    • privacy
    • secure computing
    • security

    Fingerprint

    Dive into the research topics of 'Maturity and Performance of Programmable Secure Computation'. Together they form a unique fingerprint.

    Cite this