and Efficient Secure Multiparty Computation (UaESMC)
Usable and Efficient Secure Multiparty
Computation (UaESMC) is a project supported by the 7th Framework Programme
of the EC within the FET (Future and Emerging Technologies) Open scheme
(grant agreement no. 284731) with AS Cybernetica as
lead partner and Royal Institute of Technology (KTH), Univesity of
Athens (UoA) and University of
Tartu (UT) as partners.
research project, the aim is to produce up-to date knowledge in the
area. This page enables you to learn more about what is secure
multiparty computation, read the public deliverables and keep yourself
up to date with usable and secure solutions researched and developed
under the framework of this project. In this project, we will bring the techniques and tools for Secure Multiparty Computation (SMC) to a level where they can be applied to decisional and computational problems of practical size in several different social and economic sectors. To achieve this, we will apply a multi-pronged research effort to build the theoretical foundations for the practical aspects of SMC application.
Our project will combine the identification of a representative set of computational problems, the development of appropriate cryptographic and other tools for solving
those problems in a privacy-preserving manner, the study of incentives
of various parties to participate in privacy-preserving computations,
and the exploration of practical limits and trade-offs in the deployment
of SMC solutions. All these research areas will be explored in tight
cooperation, as advances in any of them will shift priorities in all
other areas. Through the integrated effort we hope to build a framework
that allows us to place any multiparty computation problem in the
appropriate context and to see whether and how the privacy issues in this problem can be mitigated. While cryptographic techniques for SMC have been studied before in Europe, our quest for identifying the other enablers of SMC through an integrated research effort appears to be novel. We believe that the research activities structured in this manner will in the fastest possible way bring us closer to our long-term goal of the privacy requirements of the input data of a computation not being a consideration whether to perform it.