{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:19:45Z","timestamp":1762514385972,"version":"build-2065373602"},"reference-count":91,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Cybersecurity Consortium and the Government of Canada"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users\u2019 privacy concerns. The presence of a privacy policy does not ensure compliance, since users must assess the trustworthiness of all parties involved in data sharing. On the other hand, service providers want to minimize the costs associated with preserving user privacy. Indeed, service providers may have their own privacy preservation requirements, such as hiding the identities of third-party suppliers. We present a novel framework designed to tackle the dual challenges of bidirectional privacy preservation and cost-effectiveness. Our framework safeguards the privacy of service users, providers, and various layers of intermediaries in data-sharing environments, while also reducing the costs incurred by service providers related to data privacy. This combination makes our solution a practical choice for web services. We have implemented our solution and conducted a performance analysis to demonstrate its viability. Additionally, we prove its privacy and security within a Universal Composability (UC) framework.<\/jats:p>","DOI":"10.3390\/computers14110484","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T10:56:45Z","timestamp":1762513005000},"page":"484","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bidirectional Privacy Preservation in Web Services"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6232-8090","authenticated-orcid":false,"given":"Sumit Kumar","family":"Paul","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering (EECS), University of Ottawa, Ottawa, ON K1N 6N5, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6138-2283","authenticated-orcid":false,"given":"D. A.","family":"Knox","sequence":"additional","affiliation":[{"name":"School of Engineering Design and Teaching Innovation (and EECS), University of Ottawa, Ottawa, ON K1N 6N5, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"key":"ref_1","unstructured":"(2025, October 01). Gdpr and Third Parties: What Companies Need to Know. Available online: https:\/\/www.riddlecompliance.com\/blog\/gdpr-and-third-parties-what-companies-need-to-know."},{"key":"ref_2","unstructured":"(2025, October 01). How Much Does a SOC 2 Audit Cost?. Available online: https:\/\/secureframe.com\/hub\/soc-2\/audit-cost."},{"key":"ref_3","first-page":"30","article-title":"GDPR Compliance in SMEs: There is much to be done","volume":"3","author":"Freitas","year":"2018","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_4","first-page":"235","article-title":"Cybersecurity needs for SMEs","volume":"25","author":"Tetteh","year":"2024","journal-title":"Issues Inf. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"89","DOI":"10.63180\/jcsra.thestap.2025.3.7","article-title":"Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review","volume":"2025","author":"Awan","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Singla, S. (2023). Regulatory Costs and Market Power. SSRN Electron. J.","DOI":"10.2139\/ssrn.4368609"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11127-017-0479-z","article-title":"How do federal regulations affect consumer prices? An analysis of the regressive effects of regulation","volume":"180","author":"Chambers","year":"2019","journal-title":"Public Choice"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MC.2023.3271449","article-title":"\u201cFree\u201d Online Services and Gonzo Capitalism","volume":"56","author":"Berghel","year":"2023","journal-title":"Computer"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Malhotra, H. (2021). Trade secret in intellectual property. SSRN Electron. J.","DOI":"10.2139\/ssrn.3796211"},{"key":"ref_10","unstructured":"(2025, October 01). Study on Trade Secrets and Confidential Business Information in the Internal Market. Available online: https:\/\/ec.europa.eu\/docsroom\/documents\/27703\/attachments\/1\/translations\/en\/renditions\/native."},{"key":"ref_11","unstructured":"Demirel, D., Derler, D., Hanser, C., P\u00f6hls, H., Slamanig, D., and Traverso, G. (2025, October 01). D4.4: Overview of Functional and Malleable Signature Schemes. Available online: https:\/\/www.prismacloud.eu\/PRISMACLOUD-D4.4-Overview-of-Functional-and-Malleable-Signature-Schemes.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Iyilade, J., and Vassileva, J. (2014, January 17\u201318). P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage. Proceedings of the 2014 IEEE Security and Privacy Workshops, San Jose, CA, USA.","DOI":"10.1109\/SPW.2014.12"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/978-3-319-56620-7_10","article-title":"Formal Abstractions for Attested Execution Secure Processors","volume":"Volume 10210","author":"Coron","year":"2017","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2017"},{"key":"ref_14","unstructured":"Anati, I., Gueron, S., Johnson, S.P., and Scarlata, V.R. (2025, October 01). Innovative Technology for CPU Based Attestation and Sealing. Available online: https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/hasp-2013-innovative-technology-for-attestation-and-sealing-413939.pdf."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential Privacy","volume":"Volume 4052","author":"Bugliesi","year":"2006","journal-title":"Automata, Languages and Programming"},{"key":"ref_16","unstructured":"(2025, October 01). New Intel Chips Won\u2019t Play Blu-Ray Disks due to SGX Deprecation. Available online: https:\/\/www.reddit.com\/r\/gadgets\/comments\/s3xhkf\/new_intel_chips_wont_play_bluray_disks_due_to_sgx\/."},{"key":"ref_17","unstructured":"(2025, October 01). Confidential Computing Market Worth $59.4 Billion by 2028\u2014Exclusive Report by MarketsandMarkets. Available online: https:\/\/www.benzinga.com\/pressreleases\/23\/06\/n32692290\/confidential-computing-market-worth-59-4-billion-by-2028-exclusive-report-by-marketsandmarkets."},{"key":"ref_18","unstructured":"(2025, October 01). Trusted Execution Environment Provisioning (TEEP) Architecture. Available online: https:\/\/datatracker.ietf.org\/doc\/rfc9397\/."},{"key":"ref_19","first-page":"126","article-title":"Security Vulnerabilities of SGX and Countermeasures: A Survey","volume":"54","author":"Fei","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Canetti, R. (2001, January 8\u201311). Universally composable security: A new paradigm for cryptographic protocols. Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, Newport Beach, CA, USA.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cheng, R., Zhang, F., Kos, J., He, W., Hynes, N., Johnson, N., Juels, A., Miller, A., and Song, D. (2019, January 17\u201319). Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lind, J., Naor, O., Eyal, I., Kelbert, F., Sirer, E.G., and Pietzuch, P. (2019, January 27\u201330). Teechain: A secure payment network with asynchronous blockchain access. Proceedings of the 27th ACM Symposium on Operating Systems Principles, Huntsville, ON, Canada.","DOI":"10.1145\/3341301.3359627"},{"key":"ref_23","unstructured":"(2025, October 01). Bidirectional Privacy. Computer Software. Available online: https:\/\/github.com\/sumitkumarpaul\/bidirectional_privacy.git."},{"key":"ref_24","unstructured":"(2025, October 01). Gramine Library OS with Intel SGX Support. Available online: https:\/\/github.com\/gramineproject\/gramine."},{"key":"ref_25","unstructured":"Tsai, C.C., Porter, D.E., and Vij, M. (2017, January 12\u201314). Graphene-SGX: A practical library OS for unmodified applications on SGX. Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC\u201917), Santa Clara, CA, USA."},{"key":"ref_26","unstructured":"(2025, October 01). Mbed TLS. Available online: https:\/\/github.com\/Mbed-TLS\/mbedtls."},{"key":"ref_27","unstructured":"Knauth, T., Steiner, M., Chakrabarti, S., Lei, L., Xing, C., and Vij, M. (2019). Integrating Remote Attestation with Transport Layer Security. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zum Felde, H.M., Morbitzer, M., and Schutte, J. (2021, January 20\u201322). Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture. Proceedings of the 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC), Shenyang, China.","DOI":"10.1109\/EUC53437.2021.00023"},{"key":"ref_29","unstructured":"(2025, October 01). DCsv3 and DCdsv3-Series. Available online: https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/dcv3-series."},{"key":"ref_30","unstructured":"(2025, October 01). Uncovering the Apps That Actually Respect Your Privacy. Available online: https:\/\/surfshark.com\/apps-that-track-you."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/TETC.2023.3261360","article-title":"cuFE: High Performance Privacy Preserving Support Vector Machine With Inner-Product Functional Encryption","volume":"12","author":"Han","year":"2023","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., and Zohner, M. (2015, January 7). ABY\u2014A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. Proceedings of the 2015 Network and Distributed System Security Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref_33","unstructured":"(2025, October 01). CiFEr\u2014Functional Encryption Library. Computer Software. Available online: https:\/\/github.com\/fentec-project\/CiFEr."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Li, F., Li, X., and Gao, M. (2023, January 4\u20138). Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse. Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA.","DOI":"10.1145\/3627106.3627145"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-319-48965-0_13","article-title":"Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing","volume":"Volume 10052","author":"Foresti","year":"2016","journal-title":"Cryptology and Network Security"},{"key":"ref_36","unstructured":"(2025, October 01). XMLRSS\u2014A Java Crypto Provider for Redactable Signatures. Computer Software. Available online: https:\/\/github.com\/woefe\/xmlrss."},{"key":"ref_37","unstructured":"(2025, October 01). The Transparency & Consent Framework (TCF). Available online: https:\/\/iabeurope.eu\/transparency-consent-framework\/."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","article-title":"P3P: Making privacy policies more useful","volume":"1","author":"Cranor","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"ref_39","unstructured":"(2025, October 01). Privacy Bird: Find web Sites That Respect Your Privacy. Computer Software. Available online: http:\/\/www.privacybird.org\/."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"151","DOI":"10.56553\/popets-2024-0010","article-title":"\u201cThose things are written by lawyers, and programmers are reading that.\u201d Mapping the Communication Gap Between Software Developers and Privacy Experts","volume":"2024","author":"Horstmann","year":"2024","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-031-68024-3_9","article-title":"Privacy Promise vs. Tracking Reality in Pay-or-Tracking Walls","volume":"Volume 14831","author":"Jensen","year":"2024","journal-title":"Privacy Technologies and Policy"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3590152","article-title":"Privacy Policies across the Ages: Content of Privacy Policies 1996\u20132021","volume":"26","author":"Wagner","year":"2023","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_43","unstructured":"(2025, October 01). General Data Protection Regulation GDPR. Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_44","unstructured":"(2025, October 01). The Personal Information Protection and Electronic Documents Act (PIPEDA). Available online: https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/."},{"key":"ref_45","unstructured":"(2025, October 01). California Consumer Privacy Act (CCPA), Available online: https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1007\/s00607-022-01076-3","article-title":"A systematic mapping study on automated analysis of privacy policies","volume":"104","author":"Guaman","year":"2022","journal-title":"Computing"},{"key":"ref_47","unstructured":"CyberSierra (2025, October 01). Hidden GDPR Compliance Expenses. Available online: https:\/\/cybersierra.co\/blog\/hidden-gdpr-compliance-expenses\/."},{"key":"ref_48","unstructured":"Thoropass (2025, October 01). GDPR Audit Cost: A Guide. Available online: https:\/\/thoropass.com\/blog\/compliance\/gdpr-audit-cost-a-guide\/."},{"key":"ref_49","unstructured":"Dorsey (2025, October 01). AG Estimates Costs of CCPA Compliance. Available online: https:\/\/www.dorsey.com\/newsresources\/publications\/client-alerts\/2019\/12\/ccpa-update."},{"key":"ref_50","unstructured":"Thoropass (2025, October 01). CCPA Audit Cost: A Guide. Available online: https:\/\/thoropass.com\/blog\/compliance\/ccpa-audit-cost-a-guide\/."},{"key":"ref_51","unstructured":"Sprinto (2025, October 01). Complete Guide to PIPEDA Compliance. Available online: https:\/\/sprinto.com\/blog\/pipeda-compliance\/."},{"key":"ref_52","unstructured":"ZipRecruiter (2025, October 01). Salary: Chief Privacy Officer (October 2025) United States. Available online: https:\/\/www.ziprecruiter.com\/Salaries\/Chief-Privacy-Officer-Salary."},{"key":"ref_53","unstructured":"USF Health Online (2025, October 01). What Is a Chief Privacy Officer?. Job Description & Salary., Available online: https:\/\/www.usfhealthonline.com\/resources\/health-informatics\/chief-privacy-officer-job-description-salary\/."},{"key":"ref_54","unstructured":"Sprinto (2025, October 01). How Much Does GDPR Compliance Cost in 2025?. Available online: https:\/\/sprinto.com\/blog\/gdpr-compliance-cost\/."},{"key":"ref_55","unstructured":"Curtis, B. (2025, October 01). Technical Competency Gaps in 151,000 IT Auditors in the Audit Industry. Available online: https:\/\/www.securitymagazine.com\/articles\/98555-technical-competency-gaps-in-151-000-it-auditors-in-the-audit-industry."},{"key":"ref_56","unstructured":"Pan, S., Zhang, D., Staples, M., Xing, Z., Chen, J., Xu, X., and Hoang, T. (August, January ). Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps. Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2002, January 20\u201323). Hippocratic Databases. Proceedings of the VLDB\u201902: Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, China.","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"ref_58","unstructured":"LeFevre, K. (September, January 31). Limiting Disclosure in Hippocratic Databases. Proceedings of the VLDB\u201904: Proceedings of the International Conference on Very Large Data Bases, Toronto, ON, Canada."},{"key":"ref_59","unstructured":"(2025, October 01). eXtensible Access Control Markup Language (XACML) Version 3.0. Available online: https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"171","DOI":"10.56553\/popets-2023-0046","article-title":"Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis","volume":"2023","author":"Kunz","year":"2023","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Tang, F., and \u00d8stvold, B.M. (2022, January 18). Assessing software privacy using the privacy flow-graph. Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security, Singapore.","DOI":"10.1145\/3549035.3561185"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Zimmeck, S., Wang, Z., Zou, L., Iyengar, R., Liu, B., Schaub, F., Wilson, S., Sadeh, N., Bellovin, S.M., and Reidenberg, J. (2017, January 27). Automated Analysis of Privacy Requirements for Mobile Apps. Proceedings of the 2017 Network and Distributed System Security Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2017.23034"},{"key":"ref_63","unstructured":"Zimmeck, S., and Bellovin, S.M. (2014, January 20\u201322). Privee: An architecture for automatically analyzing web privacy policies. Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914), San Diego, CA, USA."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Yu, L., Zhang, T., Luo, X., and Xue, L. (2015, January 12). AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Denver, CO, USA.","DOI":"10.1145\/2808117.2808125"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Zimmeck, S., Goldstein, R., and Baraka, D. (2021, January 21\u201325). PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. Proceedings of the 2021 Network and Distributed System Security Symposium, Virtual Event.","DOI":"10.14722\/ndss.2021.24100"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Schwichtenberg, H., and Steinbr\u00fcggen, R. (2002). Proof-Carrying Code. Design and Implementation. Proof and System-Reliability, Springer.","DOI":"10.1007\/978-94-010-0413-8"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Liu, K., Wang, Q., Han, J., and Wu, H. (2007, January 24\u201326). A Privacy Protection Method for P2P-based Web Service Discovery. Proceedings of the IEEE International Conference on E-Business Engineering (ICEBE\u201907), Hong Kong, China.","DOI":"10.1109\/ICEBE.2007.113"},{"key":"ref_68","unstructured":"Alansari, S. (2020). A Blockchain-Based Approach for Secure, Transparent and Accountable Personal Data Sharing. [Ph.D. Thesis, University of Southampton]."},{"key":"ref_69","unstructured":"(2025, October 01). What Are Smart Contracts on Blockchain?. 2025., Available online: https:\/\/www.ibm.com\/topics\/smart-contracts."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Hulsen, T. (2020). Sharing Is Caring\u2014Data Sharing Initiatives in Healthcare. Int. J. Environ. Res. Public Health, 17.","DOI":"10.20944\/preprints202003.0141.v1"},{"key":"ref_71","unstructured":"(2025, October 01). The Next Generation of Data-Sharing in Financial Services: Using Privacy Enhancing Techniques to Unlock New Value. Available online: https:\/\/www3.weforum.org\/docs\/WEF_Next_Gen_Data_Sharing_Financial_Services.pdf."},{"key":"ref_72","unstructured":"Goasduff, L. (2025, October 01). Data Sharing Is a Business Necessity to Accelerate Digital Business. Available online: https:\/\/www.gartner.com\/smarterwithgartner\/data-sharing-is-a-business-necessity-to-accelerate-digital-business."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"427","DOI":"10.3233\/JCS-15801","article-title":"Hails: Protecting data privacy in untrusted web applications","volume":"25","author":"Giffin","year":"2017","journal-title":"J. Comput. Secur."},{"key":"ref_74","unstructured":"Andow, B., Mahmud, S.Y., Whitaker, J., Enck, W., Reaves, B., Singh, K., and Egelman, S. (2020, January 12\u201314). Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with POLICHECK. Proceedings of the 29th USENIX Conference on Security Symposium (SEC\u201920), Virtual."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Noorian, Z., Iyilade, J., Mohkami, M., and Vassileva, J. (2014, January 24\u201326). Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts. Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China.","DOI":"10.1109\/TrustCom.2014.66"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1109\/JSYST.2022.3159832","article-title":"Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage","volume":"16","author":"Li","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","article-title":"Survey on Fully Homomorphic Encryption, Theory, and Applications","volume":"110","author":"Marcolla","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.3934\/amc.2021049","article-title":"A survey on functional encryption","volume":"17","author":"Mascia","year":"2023","journal-title":"Adv. Math. Commun."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3387108","article-title":"Secure multiparty computation","volume":"64","author":"Lindell","year":"2020","journal-title":"Commun. ACM"},{"key":"ref_80","unstructured":"Ni, Z., and Wang, R. (2020). Performance Evaluation of Secure Multi-party Computation on Heterogeneous Nodes. arXiv."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Brands, S.A. (2001). Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, MIT Press. [2nd ed.].","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1002\/sec.213","article-title":"Digital credentials with privacy-preserving delegation","volume":"4","author":"Knox","year":"2011","journal-title":"Secur. Commun. Netw."},{"key":"ref_83","unstructured":"Costan, V., and Devadas, S. (2025, October 01). Intel SGX Explained. Available online: https:\/\/eprint.iacr.org\/2016\/086."},{"key":"ref_84","unstructured":"Fisch, B., Vinayagamurthy, D., Boneh, D., and Gorbunov, S. (November, January 30). IRON: Functional Encryption using Intel SGX. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA."},{"key":"ref_85","unstructured":"Krahn, R., Trach, B., Vahldiek-Oberwagner, A., Knauth, T., Bhatotia, P., and Fetzer, C. (2018, January 23\u201326). Pesos: Policy enhanced secure object store. Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Wagner, P.G., Birnstill, P., and Beyerer, J. (2018, January 13\u201315). Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, Indianapolis, IN, USA.","DOI":"10.1145\/3205977.3205990"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Birrell, E., Gjerdrum, A., Van Renesse, R., Johansen, H., Johansen, D., and Schneider, F.B. (2018, January 15). SGX Enforcement of Use-Based Privacy. Proceedings of the 2018 Workshop on Privacy in the Electronic Society, Toronto, ON, Canada.","DOI":"10.1145\/3267323.3268954"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Gao, M., Dang, H., and Chang, E.C. (2021, January 6\u201310). TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. Proceedings of the Annual Computer Security Applications Conference, Virtual Event.","DOI":"10.1145\/3485832.3485919"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"4456","DOI":"10.1109\/TII.2021.3123312","article-title":"A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_90","unstructured":"(2025, October 01). Trusted Platform Module Technology Overview. Available online: https:\/\/learn.microsoft.com\/en-us\/windows\/security\/information-protection\/tpm\/trusted-platform-module-overview."},{"key":"ref_91","unstructured":"(2025, October 01). CBI to Investigate Role of \u2018Political Pressure\u2019 in Cases Involving Vijay Mallya: Report. Available online: https:\/\/scroll.in\/latest\/805034\/cbi-to-investigate-role-of-political-pressure-in-cases-involving-vijay-mallya-report."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/11\/484\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:16:06Z","timestamp":1762514166000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/11\/484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":91,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["computers14110484"],"URL":"https:\/\/doi.org\/10.3390\/computers14110484","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2025,11,6]]}}}