Signal processing in the encrypted domain
The use of cloud services for processing sensitive data poses ever increasing privacy risks.
Our group has long term experience in techniques for processing data directly in the encrypted domain by exploiting specialized crypto primitives, including homomorphic cryptosystems, secret sharing, and multi-party computation protocols. These techniques can be applied in several privacy-preserving protocols, for example for secure biometric identification or secure remote medical diagnosis.
- PE7_7 Signal processing
- PE6_5 Cryptology, security, privacy, quantum crypto
- Data privacy
- Signal processing algorithms
- BIANCHI TIZIANO - Manager