Running Projects

The Engineering Cryptographic Protocols Group is currently involved in the following projects.

CRISP - Center for Research in Security and Privacy

Bundesministerium für Bildung und Forschung (BMBF) &
State of Hesse, 2015-2020

The former IT security centers EC SPRIDE and CASED funded by the German Federal Government and the State of Hesse respectively have been united to bundle their strengths in the "Center for Research in Security and Privacy" (CRISP). Under the core topic "Security at Large" its research activities focus on the study of security for large systems, starting with their individual components up to their interaction within comprehensive security solutions. The ENCRYPTO group is involved in the following subprojects:

  • IP1 - Scalable Privacy-Preserving Protocols: we will develop innovative methods that guarantee the protection of privacy, can be integrated into applications, and scale even for large amounts of data; the PIs are Dr. Thomas Schneider and Prof. Kay Hamacher.
  • IP3 - Protection Mechanisms for Big Data and Complex Private Functions: we will develop protection mechanisms for big data and complex private functions based on cryptographic protocols for secure computation as well as hardware measures in the form of Trusted Execution Environments such as Intel SGX; the PIs are Dr. Thomas Schneider, Prof. Stefan Katzenbeisser, and Prof. Patrick Eugster.


Collaborative Research Center: Cryptography-Based Security Solutions (CROSSING)

Deutsche Forschungsgemeinschaft (DFG), 2014-2018

Collaborative Research Centers (Sonderforschungsbereiche) are institutions funded by the German Research Foundation (DFG) and are established at universities to pursue a scientifically ambitious, complex, long-term research program. The goal of the center CROSSING - Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments is to provide cryptography-based security solutions enabling trust in new and next generation computing environments. The solutions will meet the efficiency and security requirements of the new environments and will have sound implementations. They will be easy to use for developers, administrators, and end users of IT, even if they are not cryptography experts. In CROSSING researchers from different areas such as cryptography, IT security, computing hardware, quantum physics, and software engineering will collaborate. Our group is involved in project S5 (Privacy-Preserving Computation) and project E4 (Compiler for Privacy-Preserving Protocols).


Intel Early Career Faculty Honor Program Award

Intel, since 2012

The Intel Early Career Faculty Honor Program was created to promote the careers of the best and brightest early career faculty members at the top universities around the world. Awardees are selected through a competitive and rigorous application process and they receive recognition as well as a cash award to help fund their research and sponsor travel to Intel to collaborate with Intel researchers. The Early Career Faculty Honor Program is an annual award that is currently open to select universities in the U.S., Europe, China, and Taiwan.

Finished Projects

The Engineering Cryptographic Protocols Group was involved in the following finished projects.

Privacy-Preserving Computation In The Cloud (PRACTICE)

European Commission (FP7), 2013-2016

The mission of PRACTICE is to design cloud computing technologies that allow computations in the cloud thus enabling new business processes while keeping the used data secret. Unlike today – where insiders can access sensitive data – PRACTICE will prevent cloud providers and other unauthorized parties from obtaining secret or sensitive information. Information processed by businesses, government organizations and individuals often comes with confidentiality and integrity requirements that the processing party must adhere to. As a result, data processors must deploy security controls for their ICT infrastructure, protecting it against external as well as internal attackers. This is relatively easy when this infrastructure is local and controlled by the processing party, but much harder when it is provided by an external service provider. Cloud services promise great benefits in terms of financial savings, easy and convenient access to data and services, as well as business agility. Organizations and individuals therefore choose to outsource their data to the cloud, where an untrusted party is in charge of storage and computation. A major concern for the adoption of cloud computing is the inability of the cloud to build user trust in the information security measures deployed in cloud services. Common computing techniques cannot be applied on encrypted data, and therefore the data and the programs that compute on the data must be decrypted before being run on the cloud infrastructure. A comprehensive solution for securing the cloud computing infrastructure can be based on cryptographic mechanisms of secure computation. These mechanisms allow for distributed computation of arbitrary functions of private (secret) inputs, while hiding any information about the inputs to the functions.


Center for Advanced Security Research Darmstadt (CASED)

Landes-Offensive zur Entwicklung Wissensch.-ökonomischer Exzellenz (LOEWE), 2008-2016

CASED is a collaborative project of the Technische Universität Darmstadt, the Fraunhofer Society and the University of Applied Science (Hochschule) Darmstadt. In the research areas Secure Data, Secure Things, and Secure Services the cluster develops applicable basic knowledge and IT security solutions. Thanks to its broadly-based position in regard to topics and competencies, the cluster and its headquarters CASED can realize especially complex projects efficiently and sustainably. Our group is part of the research area Secure Data and of the Cryptography Lab.


European Center for Security and Privacy by Design (EC SPRIDE)

Bundesministerium für Bildung und Forschung (BMBF), 2011-2015

The BMBF project EC SPRIDE researches how IT developers can optimally secure software and IT systems from the very beginning, i.e. “by Design”, and throughout the entire lifecycle. EC SPRIDE provides the base funding for our group. Within this project, we develop models, languages, and tools for security and privacy by design during the entire lifecycle of privacy-preserving protocols in various application scenarios.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang