Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (5): 15-24.doi: 10.12267/j.issn.2096-5931.2022.05.003

Original article Previous Articles     Next Articles

Trusted-environment-based privacy preserving computing: breaks the bottleneck of ciphertext-exchange era

WEI Tao, PAN Wuqiong, LI Tingting, WEI Zhenqiang   

  1. Ant Group Co., Ltd., Hangzhou 310063, China
  • Received:2022-03-10 Online:2022-05-15 Published:2022-05-26


Due to security needs and regulatory requirements, the data exchange between entities is about to enter the ciphertext-exchange era. In order to satisfy the needs of data services related to the nation’s livelihood in various industries, the encrypted computing technology must meet the requirements as an infrastructure in terms of security, performance, reliability, applicability, and cost. In this paper, analyze the current status of key technologies required in the ciphertext-exchange era and find that they all have inherently insurmountable drawbacks. This paper proposes a new way of privacy preserving computing: Trusted-environment-based privacy preserving computing, which obtains more robust and balanced integrated properties by combining cryptographic and trusted computing techniques. Then, introduce two typical techniques-controlled anonymization and trusted-environment-based cryptographic computing.

Key words: ciphertext-exchange era, privacy preserving computing, trusted-environment-based privacy computing, trusted-environment-based cryptography computing

CLC Number: