The ENCRYPTO Group is currently involved in the following projects.
National Research Center for Applied Cybersecurity CRISP
Bundesministerium für Bildung und Forschung (BMBF) & State of Hesse, since 2015
The former IT security centers EC SPRIDE and CASED funded by the German Federal Government and the Hessisches Ministerium für Wissenschaft und Kunst (HMWK) respectively have been united to bundle their strengths in the “National Research Center for Applied Cybersecurity CRISP”. Under the core topic “Security at Large” its research activities focus on the study of security for large systems, starting with their individual components up to their interaction within comprehensive security solutions. The ENCRYPTO group is involved in the following subprojects:
- Practical Private Set Intersection for Data Protection (01.01.2019 – 31.12.2022, as part of the mission Future Data Economy and Society (FANCY): Co-Development of Privacy-Enhancing Technologies and Data-Driven Business Models): we will improve the practicality of private set intersection (PSI) protocols that allow to match (and further process) sensitive data collections in a provably secure way without unjustifiably compromising the privacy of the associated individuals; the PI is Prof. Thomas Schneider.
- IP3 – Protection Mechanisms for Big Data and Complex Private Functions (01.06.2017 – 31.05.2020): we will develop protection mechanisms for big data and complex private functions based on cryptographic protocols for secure computation as well as hardware measures in the form of Trusted Execution Environments such as Intel SGX; the PIs are Prof. Thomas Schneider, Prof. Stefan Katzenbeisser, and Prof. Patrick Eugster
- IP1 – Scalable Privacy-Preserving Protocols (01.10.2015 – 31.3.2018): we developed innovative methods that guarantee the protection of privacy, can be integrated into applications, and scale even for large amounts of data; the PIs are Prof. Thomas Schneider and Prof. Kay Hamacher.
Collaborative Research Center: Cryptography-Based Security Solutions (CROSSING)
Deutsche Forschungsgemeinschaft (DFG), 2014-2022
Collaborative Research Centers (Sonderforschungsbereiche) are institutions funded by the German Research Foundation (DFG) and are established at universities to pursue a scientifically ambitious, complex, long-term research program. The goal of the center CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments is to provide cryptography-based security solutions enabling trust in new and next generation computing environments. The solutions will meet the efficiency and security requirements of the new environments and will have sound implementations. They will be easy to use for developers, administrators, and end users of IT, even if they are not cryptography experts. In CROSSING researchers from different areas such as cryptography, IT security, computing hardware, quantum physics, and software engineering will collaborate. In the first funding phase of CROSSING, our group was involved in project S5 (Privacy-Preserving Computation) and project E4 (Compiler for Privacy-Preserving Protocols). In the second funding phase, both projects were merged into project E4 (Compiler for Privacy-Preserving Protocols).
Research Training Group: Privacy and Trust for Mobile Users
Deutsche Forschungsgemeinschaft (DFG), since 2019
The Doctoral College “Privacy and Trust for Mobile Users” is a Research Training Group (RTG) funded by the German National Science Foundation (DFG). It is a highly interdisciplinary collaboration between Computer Science and the fields of Law, Economics, Sociology, and usability research. Mobile information and communication technology has become virtually ubiquitous due to the proliferation of smartphones and tablet computers; large sections of the society use it to their advantage. In reference to the relationship users-network, public debates highlight the increasing transparency of users (in the sense of a surveillance society) while the network is deemed to become increasingly nontransparent, i.e. inscrutable. The RTG focuses on major contributions to reversing this trend: It shall enable better privacy protection for users and better transparency, i.e., assessability of the network; Privacy protection shall be customizable to personal interests yet manageable by the lay person; Privacy-opposing economic or societal interests shall be better reconciled. The ENCRYPTO group is involved in research area A (Privacy and Trust in Service Networks).
Intel Early Career Faculty Honor Program Award
Intel, since 2012
The Intel Early Career Faculty Honor Program was created to promote the careers of the best and brightest early career faculty members at the top universities around the world. Awardees are selected through a competitive and rigorous application process and they receive recognition as well as a cash award to help fund their research and sponsor travel to Intel to collaborate with Intel researchers. The Early Career Faculty Honor Program is an annual award that is currently open to select universities in the U.S., Europe, China, and Taiwan.
The ENCRYPTO Group was involved in the following finished projects.
Privacy-Preserving Computation In The Cloud (PRACTICE)
European Commission (FP7), 2013-2016
The mission of PRACTICE is to design cloud computing technologies that allow computations in the cloud thus enabling new business processes while keeping the used data secret. Unlike today – where insiders can access sensitive data – PRACTICE will prevent cloud providers and other unauthorized parties from obtaining secret or sensitive information. Information processed by businesses, government organizations and individuals often comes with confidentiality and integrity requirements that the processing party must adhere to. As a result, data processors must deploy security controls for their ICT infrastructure, protecting it against external as well as internal attackers. This is relatively easy when this infrastructure is local and controlled by the processing party, but much harder when it is provided by an external service provider. Cloud services promise great benefits in terms of financial savings, easy and convenient access to data and services, as well as business agility. Organizations and individuals therefore choose to outsource their data to the cloud, where an untrusted party is in charge of storage and computation. A major concern for the adoption of cloud computing is the inability of the cloud to build user trust in the information security measures deployed in cloud services. Common computing techniques cannot be applied on encrypted data, and therefore the data and the programs that compute on the data must be decrypted before being run on the cloud infrastructure. A comprehensive solution for securing the cloud computing infrastructure can be based on cryptographic mechanisms of secure computation. These mechanisms allow for distributed computation of arbitrary functions of private (secret) inputs, while hiding any information about the inputs to the functions.
Center for Advanced Security Research Darmstadt (CASED)
Landes-Offensive zur Entwicklung Wissensch.-ökonomischer Exzellenz (LOEWE), 2008-2016
CASED is a collaborative project of the Technische Universität Darmstadt, the Fraunhofer Society and the University of Applied Science (Hochschule) Darmstadt. In the research areas Secure Data, Secure Things, and Secure Services the cluster develops applicable basic knowledge and IT security solutions. Thanks to its broadly-based position in regard to topics and competencies, the cluster and its headquarters CASED can realize especially complex projects efficiently and sustainably. Our group is part of the research area Secure Data and of the Cryptography Lab.
European Center for Security and Privacy by Design (EC SPRIDE)
Bundesministerium für Bildung und Forschung (BMBF), 2011-2015
The BMBF project EC SPRIDE researches how IT developers can optimally secure software and IT systems from the very beginning, i.e. “by Design”, and throughout the entire lifecycle. EC SPRIDE provides the base funding for our group. Within this project, we develop models, languages, and tools for security and privacy by design during the entire lifecycle of privacy-preserving protocols in various application scenarios.