TC

T.J. Coopmans

7 records found

Cryptography is used everywhere in our society, from simple internet searches to providing security and privacy for our banking systems. A key research area in this field is secure function evaluation, where multiple parties compute a function of their inputs, without revealing t ...

Computation Capabilities of Server-Side Trusted Execution Environments

A Comparison of TEEs to Privacy-Preserving Technologies

While securing data-in-use was assured by well-known encryption algorithms, the industry shifted towards trusting hardware manufacturers in exchange for efficiency speedups through Trusted Execution Environments. However, there are many technologies to choose from, each with its ...

An analysis of Structured Encryption compared to other secure computation technologies

A review of Structured Encryption schemes compared to Oblivious RAM, Multi-party Computation, Homomorphic Encryption and Trusted Execution Environments in the context of computing on encrypted data

With the ever-growing cloud capacity in our society, being able to harness that immense computational power while keeping our data private has become a strong point of interest. This can be achieved with Structured Encryption, which allows a data structure to be encrypted and sto ...

A Comparative Study of Privacy-Preserving Computation Techniques

Contrasting ORAM, MPC, TEEs, Structured Encryption, and Homomorphic Encryption

Outsourcing data to the cloud can pose serious security threats due to an attacker observing the data access patterns, even though data is encrypted. Ideally, confidentiality should not depend on the server being a trusted party. Oblivious Random Access Machines are tackling t ...

Secure Multi-party Computation: A Survey

A Comparison of Secure Multi-party Computation Protocols and other Techniques for Computing on Encrypted Data

Secure multi-party computation (MPC) allows parties to compute on their secret inputs, without revealing them to each other. As an area of theoretical interest, many MPC protocol have been developed in the last four decades. They each present different characteristics and are cla ...

Computing with Fully Homomorphic Encryption

Constructions, Characteristics and Comparisons

In the digital economy, individual data sovereignty is a requirement for sustainable and secure development. With an increase in the number of outsourced computations, due to the adoption of web services, artificial intelligence and research-based innovation, privacy became one o ...

Evaluating Multi-Metric Scheduler Performance in a Quantum Hub Network with NetSquid

A Method for Selecting a Scheduler in a Centralized Quantum Network

As technology for implementing quantum networks advances, the challenge of efficiently managing entanglement generation under resource constraints becomes critical. In this thesis, a systematic methodology for selecting scheduling strategies in a centralised quantum network is pr ...