In this deliverable D5.1 “Security and Trust Models”, we discuss the hardware-supported FE schemes studied in WP5 of FENTEC and describe the security and trust models for the computing platforms executing computations required by the FE schemes. That is, in this deliverable, we solely focus on the implementation layer of the FE schemes and all discussion on efficiency as well as security and trust models are about the implementations rather than the theoretical schemes or algorithms per se. We define a generic computing platform modelling the large variety of computing platforms covered by FENTEC and its use cases. We employ this generic model to define adversarial, security and trust models that cover different types of adversaries as well as layers of security and trust in various possible deployments of FE.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use