Periodic Reporting for period 1 - CONFIDENTIAL6G (Confidential Computing and Privacy-preserving Technologies for 6G)
Reporting period: 2023-01-01 to 2024-06-30
• In use.
• In transit.
• At the Edge.
CONFIDENTIAL6G will base its research on 3 pillars: Post-quantum cryptography, Confidential Computing and Confidential Communication. CONFIDENTIAL6G will test and validate the developed solutions in three use cases
1) Predictive maintenance for airline consortium
2) mitigation of internal threats for telecom cloud providers and
3) Intelligent connected vehicle for mission-critical services and OTA updates
Domain 1: Confidential Computing Enablers: CONFIDENTIAL6G will significantly improve the efficiency of Fully Homomorphic Encryption (FHE) schemes, by considering relaxed functionalities tailored towards specific AI applications and design of new encryption functions that are more efficient in the cost model of FHE; provide Secure Multi-party Computation (SMPC) cryptographic protocols that distribute a computation across multiple parties, with a focus on improving pre-processing for the types of computations carried out in AI/ML; enable Trusted Execution Environment (TEE) abstractions in an architecture-agnostic manner and with the support for remote attestations; address the challenge of complex federated orchestration for AI/ML workloads in order to increase privacy-preservation of the computations.
Domain 2: Confidential Communication Enablers: CONFIDENTIAL6G will develop new post-quantum secure cryptographic network protocols adequate for the use in secure 6G applications. The design of these systems is supported by in-depth, state-of-the-art cryptographic analysis and formal security proofs. These protocols serve as essential enablers for the goals of the project when protecting against quantum attackers. CONFIDENTIAL6G will research the application of PQC primitives on securing the networking protocols - above all TLS. Blockchain efficiency will be researched and new approaches and cryptographic enablers developed to enhance network security with quantum-safe protocols, and enhance blockchain technologies with anonymity and privacy protection, notably using ZKP and FHE encryption schemes to increase the privacy of Smart Contracts. Additionally, DLT technology will be examined in the domain of sovereignty and authentication/authorization for devices and persons with the potential of DIDs and Anonymous and Verifiable Credentials it can bring.
Domain 3: Confidential Edge and IoT enablers: CONFIDENTIAL6G will propose novel methods to resolve crucial challenges in the Federated Learning (FL) space, such as: scaling the FL algorithms to run on thousands - millions of devices using hierarchical networks and edge computing technology, and accommodating the heterogeneity of resources such as different types of devices, TEE capabilities and data available per device. CONFIDENTIAL6G will propose an integration of trusted computing with a B5G supported environment and define its role in eliminating attack vectors, especially those against identity and firmware tampering which will become a major attack vector. Edge and constrained devices bring new challenges when it comes to confidential data operations. To achieve this, CONFIDENTIAL6G will research FPGA- and GPU-accelerated FHE, develop PQC algorithms, adapted to run even on the far-edge nodes; permit FHE operations be offloaded to the server, and devices’ libraries; HW-supported acceleration for cryptographic and confidential computing operations to enable practical use of these techniques on devices with constrained resources.