PRIVACY & CONFIDENTIALITY, DE-ANONYMIZATION
WP5 designs and implements efficient multiparty computation, private-set intersection and multi-user data aggregation protocols, that build the cryptographic basis for privacy-preserving data analytics and confidential lead-time based pricing.
In WP5 we develop solutions for different kinds of scenarios where data owners can securely compute on the combined datasets preserving its privacy and confidentially. In the course of this computation no party should be able to learn any information about the data of the other party except the result of their joint computation. This should lead to specialized protocols, e.g. for business partners to capitalize on their data sets by performing analysis on the combined data without sharing any confidential content or for manufacturers and their customers to interactively negotiate product orders while preserving the confidentiality of the involved business data in such negotiations. In particular, this will facilitate companies to safely engage in big data marketplaces and compute on personal data while ideally maintaining GDPR compliance.
In the last step, the internal verification is important. We have to make sure that data exposed in the project are not reasonably likely to be re-identified. This verification is done by applying a battery of statistical de-anonymization methods and will be considered as successful only when all applied de-anonymization algorithms fail.
- D5.1 – Requirements for secure computation on large datasets with multiple owners
- D5.2 – Low complexity primitives v1
- D5.3 – PSI/MPC and multiuser data aggregation protocols v1
- D5.4 – Protocols for privacy preserving data analytics and secure lead-time based pricing v1
- D5.5 – Implementation of cryptographic building blocks and specialized protocols
- D5.6 – Report on the application of re-identification techniques on use-case data v1
- D5.7 – Low complexity primitives v2 (Nov. 2020)
- D5.8 – PSI/MPC and multi-user data aggregation protocols v2 (Nov. 2020)
- D5.9 – Implementation of cryptographic building blocks and specialized protocols v2 (Nov. 2020)
- D5.10 – Report on the application of re-identifcation techniques on use-case data v2 (Nov. 2020)
- D5.11 – Protocols for privacy-preserving data analytics and secure lead-time based pricing v2 (May 2021)
- D5.12 – Implementation of cryptographic building blocks and specialized protocols v3 (Nov. 2021)