Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Confidential Computing and Privacy-preserving Technologies for 6G

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Post-quantum Analysis Report (opens in new window)

Analysis report on the post-quantum threats and tooling ecosystem, including a detailed analysis on the challenges of the migration towards PQC infrastructures.

Requirements and Architecture for Confidential Computing in 6G (opens in new window)

Document describing requirements and architecture for secure and privacy preserving computations.

Secure Decentralized Data Sharing (opens in new window)

Document describing secure blockchain-based data sharing and access control platform with privacy-preserving characteristics, based on quantum-safe cryptography and with confidential ZKP-enhanced blockchain characteristics.

Initial communication, dissemination, standardisation and exploitation activities (opens in new window)

This will be a report summarising all activities related to dissemination, communication, ecosystem building, standardisation, IPR management and exploitation during the first half of the project.

Plan for dissemination and exploitation including communication activities (opens in new window)

Describe the detailed dissemination, communication and exploitation plan of the project (including project website, social media channels and branding).

Requirements and Architecture for Confidential Networking in 6G (opens in new window)

Report outlining the requirements and architecture for confidential computing.

Publications

HELIOPOLIS: Verifiable Computation over Homomorphically Encrypted Data from Interactive Oracle Proofs is Practical

Author(s): Diego F. Aranha, Anamaria Costache, Antonio Guimarães, Eduardo Soria-Vázquez
Published in: Cryptology {ePrint} Archive, 2024
Publisher: Cryptology {ePrint} Archive

A Dedicated Consensus Algorithm for Improving Performance of Futuristic Energy Blockchain (opens in new window)

Author(s): Charithri Yapa, Chamitha De Alwis, Uditha Wijewardhana, Madhusanka Liyanage
Published in: 2024 IEEE International Conference on Consumer Electronics (ICCE), 2024
Publisher: IEEE
DOI: 10.1109/ICCE59016.2024.10444184

Privacy-Preserved Collaborative Federated Learning Platform for Industrial Internet of Things (opens in new window)

Author(s): Lakshan Pathiraja, Isuru Lakshan, Kavini Kushani, Chamara Sandeepa, Tharindu D. Gamage, Thilina Weerasinghe, Madhusanka Liyanage
Published in: 2023 IEEE Latin-American Conference on Communications (LATINCOM), 2023, ISSN 2689-7563
Publisher: IEEE
DOI: 10.1109/LATINCOM59467.2023.1036188610.1109/LATINCOM59467.2023.10361886

Machine Learning for Data Trust Evaluations in Blockchain-Enabled IoT Systems (opens in new window)

Author(s): R. Ratnayake, M. Liyanage and L. Murphy
Published in: 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland, 2024
Publisher: IEEE
DOI: 10.1109/ICBC59979.2024.10634433

Proof of Equation: A Novel Consensus Algorithm for Dynamic Spectrum Access (opens in new window)

Author(s): Thiwanka Silva, Madhushika Bamunuge, Dilusha Dissanayake, Chatura Seneviratne, Tharindu Gamage, Madhusanka Liyanage
Published in: 2023 IEEE AFRICON, 2023, ISSN 2153-0033
Publisher: IEEE
DOI: 10.1109/AFRICON55910.2023.10293543

Aloha-HE: A Low-Area Hardware Accelerator for Client-Side Operations in Homomorphic Encryption (opens in new window)

Author(s): Florian Krieger, Florian Hirner, Ahmet Can Mert, Sujoy Sinha Roy
Published in: 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024
Publisher: IEEE
DOI: 10.23919/DATE58400.2024.10546608

6G Security Vision - A Concise Update (opens in new window)

Author(s): Gürkan Gür, Pawani Porambage, Diana Pamela Moya Osorio, Attila Altay Yavuz, Madhusanka Liyanage
Published in: IEEE Future Networks World Forum (FNWF 2023), 2024, ISSN 2770-7679
Publisher: IEEE
DOI: 10.1109/FNWF58287.2023.10520627

Blockchain-Enabled RF Radiation Exposure Level Measurement in Wireless Mobile Networks (opens in new window)

Author(s): Nivin Madawalage, Tharani Thalgahagoda, Inushi Gunatilake, Pramitha Fernando, Geeth Wijesiri, Chatura Seneviratne, Madusanka Liyanage
Published in: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 2024
Publisher: IEEE
DOI: 10.1109/CCNC51664.2024.10454816

Breaking Chains, Empowering IoT: A Comparative Study of Holochain and Blockchain (opens in new window)

Author(s): P. Fernando, A. Braeken and M. Liyanage
Published in: 2023 IEEE Latin-American Conference on Communications (LATINCOM), 2023, ISBN 979-8-3503-2687-1
Publisher: IEEE
DOI: 10.1109/LATINCOM59467.2023.10361851

Unlocking Spectrum Potential: A Blockchain-Powered Paradigm for Dynamic Spectrum Management (opens in new window)

Author(s): Lavan Perera, Pasika Ranaweera, Sachitha Kusaladharma, Shen Wang, Madhusanka Liyanage
Published in: 2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2024
Publisher: IEEE
DOI: 10.1109/EUCNC/6GSUMMIT60053.2024.10597118

Verifiable Computation for Approximate Homomorphic Encryption Schemes (opens in new window)

Author(s): Ignacio Cascudo, Anamaria Costache, Daniele Cozzo, Dario Fiore, Antonio Guimarães, Eduardo Soria-Vazquez
Published in: Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2025, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-01907-3_21

Practical Two-party Computational Differential Privacy with Active Security

Author(s): Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
Published in: Proceedings on Privacy Enhancing Technologies: Volume 2025, 2025
Publisher: IACR

Measuring Conditional Anonymity - A Global Study (opens in new window)

Author(s): Pascal Berrang, Paul Gerhart, Dominique Schröder
Published in: 2024 Proceedings on Privacy Enhancing Technologies, 2024
Publisher: Privacy Enhancing Technologies Symposium
DOI: 10.56553/popets-2024-0150

Tightly-Secure Group Key Exchange with Perfect Forward Secrecy (opens in new window)

Author(s): Emanuele Di Giandomenico, Doreen Riepel, Sven Schäge
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2024, 2024
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-96-0935-2_5

Publicly Verifiable Secret Sharing Over Class Groups and Applications to DKG and YOSO (opens in new window)

Author(s): Cascudo, I., David, B.
Published in: Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, 2024, ISBN 978-3-031-58740-5
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-58740-5_8

A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework

Author(s): Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage
Published in: 22nd IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom-2023), 2023
Publisher: IEEE

A Blockchain-based Authentication Protocol for Metaverse Environments using a Zero Knowledge Proof (opens in new window)

Author(s): Awaneesh Kumar Yadav, An Braeken, Mika Ylianttila, Madhusanka Liyanage
Published in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023, ISBN 979-8-3503-3333-6
Publisher: IEEE
DOI: 10.1109/MetaCom57706.2023.00053

New Limits for Homomorphic Encryption (opens in new window)

Author(s): Sven Schäge, Marc Vorstermans
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2025, 2025
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-95-5125-5_16

Demo: Radio Spectrum Data Collection with Distributed-Proof-of-Sense Blockchain Network (opens in new window)

Author(s): Pramitha Fernando, Madusanka Liyanage
Published in: 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2024
Publisher: IEEE
DOI: 10.1109/ICBC59979.2024.10634449

Foundations of Adaptor Signatures (opens in new window)

Author(s): Gerhart, Paul and Schröder, Dominique and Soni, Pratik and Thyagarajan, Sri AravindaKrishnan
Published in: 2024 Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, ISBN 978-3-031-58722-1
Publisher: Springer
DOI: 10.1007/978-3-031-58723-8_6

Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? (opens in new window)

Author(s): Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch, Qingju Wang
Published in: Lecture Notes in Computer Science, Selected Areas in Cryptography – SAC 2024, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-82841-6_9

New Limits of Provable Security and Applications to ElGamal Encryption (opens in new window)

Author(s): Sven Schäge
Published in: Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, 2024, ISBN 978-3-031-58737-5
Publisher: Springer,Cham
DOI: 10.1007/978-3-031-58737-5_10

Protoss: Protocol for Tight Optimal Symmetric Security (opens in new window)

Author(s): Emanuele Di Giandomenico, Yong Li, Sven Schäge
Published in: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Publisher: ACM
DOI: 10.1145/3658644.3690252

Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity

Author(s): Ignacio Cascudo, Daniele Cozzo, Emanuele Giunta
Published in: Cryptology {ePrint} Archive, 2024
Publisher: Cryptology {ePrint} Archive

On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes (opens in new window)

Author(s): Bartoli, C., Cascudo, I.
Published in: Public-Key Cryptography – PKC 2024. PKC 2024, 2024, ISBN 978-3-031-57722-2
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-57722-2_14

Utilization of a Blockchain-Based Reputation Management System for Energy Trading in Smart Grid 2.0, (opens in new window)

Author(s): C. Yapa, C. De Alwis, U. Wijewardhana and M. Liyanage
Published in: 2023 IEEE Latin-American Conference on Communications (LATINCOM), 2023, ISBN 979-8-3503-2687-1
Publisher: IEEE
DOI: 10.1109/LATINCOM59467.2023.10361893

Homomorphic WiSARDs: Efficient Weightless Neural Network Training over Encrypted Data (opens in new window)

Author(s): Leonardo Neumann; Antonio Guimarães; Diego F. Aranha; Edson Borin
Published in: M Fischlin & V Moonsamy (eds), Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings. Lecture Notes in Computer Science, vol. 15827, pp. 309-338, 23rd International Conference on Applied Cryptography and Network, 2025, ISBN 978-3-031-95767-3
Publisher: Springer, Cham
DOI: 10.48550/ARXIV.2403.20190

Trust Management and Bad Data Reduction in Internet of Vehicles Using Blockchain and AI (opens in new window)

Author(s): Rashmi Ratnayake; Madhusanka Liyanage; Liam Murphy
Published in: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 2023, ISBN 979-8-3503-1114-3
Publisher: IEEE
DOI: 10.1109/VTC2023-Spring57618.2023.10200207

Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems (opens in new window)

Author(s): Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage
Published in: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 2024
Publisher: IEEE
DOI: 10.1109/CCNC51664.2024.10454688

Blockchain-Enabled Private 5G Networks: A Primer (opens in new window)

Author(s): Nisita Weerasinghe, Tharaka Hewa, Anshumaan Kalla, Mika Ylianttila, Madhusanka Liyanage
Published in: 2023 IEEE AFRICON, 2023, ISBN 979-8-3503-3923-9
Publisher: IEEE
DOI: 10.1109/BCCA58897.2023.10338873

Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications (opens in new window)

Author(s): Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila
Published in: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 2024
Publisher: IEEE
DOI: 10.1109/CCNC51664.2024.10454789

The Fiat–Shamir Transformation of (Γ1, . . . , Γµ)-Special-Sound Interactive Proofs

Author(s): Thomas Attema, Serge Fehr, Michael Klooß, Nicolas Resch
Published in: CRYPTO'24 - UNDER SUBMISSION, 2023
Publisher: Crypto24

Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi (opens in new window)

Author(s): Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger
Published in: IACR Transactions on Symmetric Cryptology, Issue 2024, 2024, ISSN 2519-173X
Publisher: Universitatsbibliothek der Ruhr-Universitat Bochum
DOI: 10.46586/TOSC.V2024.I4.138-190

Distributed-Proof-of-Sense: Blockchain Consensus Mechanisms for Detecting Spectrum Access Violations of the Radio Spectrum (opens in new window)

Author(s): Pramitha Fernando; Keshawa Dadallage; Tharindu Gamage; Chathura Seneviratne; An Braeken; Arjuna Madanayake; Madhusanka Liyanage
Published in: EEE Transactions on Cognitive Communications and Networking, 2023, ISSN 2332-7731
Publisher: IEEE
DOI: 10.1109/TCCN.2023.3291366

Skyscraper: Fast Hashing on Big Primes (opens in new window)

Author(s): Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2025, 2025, ISSN 2569-2925
Publisher: Universitatsbibliothek der Ruhr-Universitat Bochum
DOI: 10.46586/TCHES.V2025.I2.743-780

A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions (opens in new window)

Author(s): Chamitha De Alwis; Pawani Porambage; Kapal Dev; Thippa Reddy Gadekallu; Madhusanka Liyanage
Published in: EEE Communications Surveys & Tutorials, 2023, ISSN 1553-877X
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/COMST.2023.3312349

Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4’ and Monolith (opens in new window)

Author(s): Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier
Published in: IACR Transactions on Symmetric Cryptology, Issue 2024, 2024, ISSN 2519-173X
Publisher: Universitatsbibliothek der Ruhr-Universitat Bochum
DOI: 10.46586/TOSC.V2024.I4.97-137

Journal of Cryptographic Engineering (opens in new window)

Author(s): Guimaraes, Antonio; Borin, Edson; Aranha, Diego F.
Published in: Journal of Cryptographic Engineering, 2024, ISSN 2190-8508
Publisher: Springer
DOI: 10.1007/s13389-024-00359-z

Blockchain for the metaverse: A Review (opens in new window)

Author(s): Thien Huynh-The; Thippa Reddy Gadekallu; Weizheng Wang; Gokul Yenduri; Pasika Ranaweera; Quoc-Viet Pham; Daniel Benevides da Costa; Madhusanka Liyanage
Published in: Future Generation Computer Systems, 2023, ISSN 0167-739X
Publisher: Elsevier
DOI: 10.48550/arxiv.2203.09738

Enhancing Security of Automotive OTA Firmware Updates via Decentralized Identifiers and Distributed Ledger Technology (opens in new window)

Author(s): Ana Kovacevic, Nenad Gligoric
Published in: Electronics, Issue 13, 2024, ISSN 2079-9292
Publisher: MDPI AG
DOI: 10.3390/electronics13234640

A Survey on Blockchain for Dynamic Spectrum Sharing (opens in new window)

Author(s): Lavan Perera; Pasika Ranaweera; Sachitha Kusaladharma; Shen Wang; Madhusanka Liyanage
Published in: IEEE Open Journal of the Communications Society, 2024, ISSN 2644-125X
Publisher: IEEE
DOI: 10.1109/ojcoms.2024.3376233

Blockchain Regulated Verifiable and Automatic Key Refreshment Mechanism for IoT (opens in new window)

Author(s): Raaj Anand Mishra; Anshuman Kalla; An Braeken; Madhusanka Liyanage
Published in: IEEE Access, 2023, ISSN 2169-3536
Publisher: IEEE
DOI: 10.1109/access.2023.3251651

Utilization of a blockchainized reputation management service for performance enhancement of Smart Grid 2.0 applications (opens in new window)

Author(s): Charithri Yapa, Chamitha De Alwis, Madhusanka Liyanage, Janaka Ekanayake
Published in: Journal of Industrial Information Integration, 2024, ISSN 2452-414X
Publisher: Elsevier
DOI: 10.1016/j.jii.2024.100580

Accelerating Multiparty Noise Generation Using Lookups

Author(s): Fredrik Meisingseth, Christian Rechberger, Fabian Schmid
Published in: Cryptology {ePrint} Archive, Paper 2025/805, 2025
Publisher: Cryptology {ePrint} Archive

Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data

Author(s): Leonardo Neumann, Antonio Guimarães, Diego F. Aranha, Edson Borin
Published in: 2024
Publisher: arxiv

New Limits of Provable Security and Applications to ElGamal Encryption (opens in new window)

Author(s): Sven Schäge
Published in: Lecture Notes in Computer Science - Advances in Cryptology – EUROCRYPT 2024, 2024
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-58737-5_10

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0