Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (10): 59-64.doi: 10.12267/j.issn.2096-5931.2025.10.009

Previous Articles     Next Articles

Research on privacy-preserving computing based on hardware-software integration solutions

YANG Jingshi, BAI Yuzhen, WANG Siyuan, JIA Xuan, YUAN Bo   

  1. Cloud Computing & Big Data Research Institute, China Academy of Information and Communications Technology, Beijing 100191, China
  • Received:2025-02-20 Online:2025-10-25 Published:2025-11-06

Abstract:

In recent years, the privacy-preserving computing technology has developed rapidly, its usability has continuously improved, and product types have gradually become more diverse. However, in practical applications, product security, algorithm usability, and ease of use are key factors in promoting the large-scale application of privacy-preserving computing. This paper first analyzes the needs of users for security, performance, and ease of use when using privacy-preserving computing technology. Then, it deeply analyzes the privacy-preserving computing system based on hardware-software integration from the aspects of architecture, technology, and functions.

Key words: privacy-preserving computing, hardware acceleration, trusted execution environment

CLC Number: