{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:39:29Z","timestamp":1760150369300,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008384","name":"Stifterverband","doi-asserted-by":"publisher","award":["H110 5114 5132 36534"],"award-info":[{"award-number":["H110 5114 5132 36534"]}],"id":[{"id":"10.13039\/501100008384","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side application developers. The resulting architecture, \u201cFederated Secure Computing\u201d, offloads computing-intensive tasks to the server and separates concerns of cryptography and business logic. It provides microservices through an Open API 3.0 definition and hosts multiple protocols through self-discovered plugins. It requires only minimal DevSecOps capabilities and is straightforward and secure. Finally, it is small enough to work in the internet of things (IoT) and in propaedeutic settings on consumer hardware. We provide benchmarks for calculations with a secure multiparty computation (SMPC) protocol, both for vertically and horizontally partitioned data. Runtimes are in the range of seconds on both dedicated workstations and IoT devices such as Raspberry Pi or smartphones. A reference implementation is available as free and open source software under the MIT license.<\/jats:p>","DOI":"10.3390\/informatics10040083","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T12:53:32Z","timestamp":1698756812000},"page":"83","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Federated Secure Computing"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4733-1926","authenticated-orcid":false,"given":"Hendrik","family":"Ballhausen","sequence":"first","affiliation":[{"name":"Medical Faculty, Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen, Geschwister-Scholl-Platz 1, 80539 Munich, Germany"}]},{"given":"Ludwig Christian","family":"Hinske","sequence":"additional","affiliation":[{"name":"Institute for Digital Medicine, University Hospital Augsburg, Stenglinstrasse 2, 86156 Augsburg, Germany"},{"name":"Department of Anaesthesiology, LMU University Hospital, LMU Munich, Marchioninistrasse 15, 81377 Munich, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"ref_1","unstructured":"Deloitte (2013). The Analytics Advantage, Deloitte."},{"key":"ref_2","unstructured":"AIG (2016). The Data Sharing Economy: Quantifying Tradeoffs That Power New Business Models, AIG."},{"key":"ref_3","unstructured":"European Commission (2023, August 23). Study on Data Sharing between Companies in Europe. Available online: https:\/\/op.europa.eu\/s\/y2R4."},{"key":"ref_4","unstructured":"TrustArc (2016). TRUSTe\/National Cyber Security Alliance U.S. Consumer Privacy Index, TrustArc."},{"key":"ref_5","unstructured":"Yao, A.C. (1982, January 3\u20135). Protocols for secure computations. Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, Chicago, IL, USA."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Damgard, I., Pastro, V., Smart, N., and Zakarias, S. (2012, January 19\u201323). Multiparty Computation from Somewhat Homomorphic Encryption. Proceedings of the 32nd Annual International Cryptology Conference (CRYPTO), University of California Santa Barbara, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref_7","unstructured":"Gentry, C. (June, January 31). Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","article-title":"Public-key cryptosystems based on composite degree residuosity classes","volume":"Volume 1592","author":"Stern","year":"1999","journal-title":"Advances in Cryptology\u2014Eurocrypt'99"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"Volume 4052","author":"Bugliesi","year":"2006","journal-title":"Automata, Languages and Programming, Pt 2"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork","year":"2013","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref_11","unstructured":"Craddock, M., Archer, D.W., Bogdanov, D., Gascon, A., de Balle Pigem, B., Laine, K., Trask, A., Raykova, M., Jug, M., and McLellan, R. (2023, August 23). UN Handbook on Privacy-Preserving Computation Techniques. Available online: https:\/\/unstats.un.org\/bigdata\/task-teams\/privacy\/UN%20Handbook%20for%20Privacy-Preserving%20Techniques.pdf."},{"key":"ref_12","unstructured":"Kolesnikov, V., and Schneider, T. (2008, January 7\u201311). Improved garbled circuit: Free XOR gates and applications. Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Reykjavik, Iceland."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1561\/0400000039","article-title":"Arithmetic Circuits: A Survey of Recent Results and Open Questions","volume":"5","author":"Shpilka","year":"2009","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11745853_14","article-title":"Curve25519: New Diffie-Hellman speed records","volume":"Volume 3958","author":"Yung","year":"2006","journal-title":"Public Key Cryptography\u2014Pkc 2006, Proceedings"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_16","unstructured":"Rabin, M.O. (1981). How to Exchange Secrets with Oblivious Transfer, Aiken Computation Laboratory, Harvard University."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Bogdanov, D., Laur, S., and Willemson, J. (2008, January 6\u20138). Sharemind: A Framework for Fast Privacy-Preserving Computations. Proceedings of the 13th European Symposium on Research in Computer Security, Malaga, Spain.","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wirth, F.N., Kussel, T., Muller, A., Hamacher, K., and Prasser, F. (2022). EasySMPC: A simple but powerful no-code tool for practical secure multiparty computation. BMC Bioinform., 23.","DOI":"10.1186\/s12859-022-05044-8"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gay, W. (2014). Raspberry Pi Hardware Reference, Apress.","DOI":"10.1007\/978-1-4842-0799-4"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1093\/ije\/dyu188","article-title":"DataSHIELD: Taking the analysis to the data, not the data to the analysis","volume":"43","author":"Gaye","year":"2014","journal-title":"Int. J. Epidemiol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.1093\/ije\/dyq111","article-title":"DataSHIELD: Resolving a conflict in contemporary bioscience-performing a pooled analysis of individual-level data without sharing the data","volume":"39","author":"Wolfson","year":"2010","journal-title":"Int. J. Epidemiol."},{"key":"ref_22","unstructured":"The Linux Foundation (2023, August 23). New Collaborative Project to Extend Swagger Specification for Building Connected Applications and Services. Available online: https:\/\/www.linuxfoundation.org\/press\/press-release\/new-collaborative-project-to-extend-swagger-specification-for-building-connected-applications-and-services."},{"key":"ref_23","unstructured":"Kr\u00fcger-Brand, H.E. (2023, August 23). Innovatives IT-Verfahren soll sensible Daten in der Krebsforschung sch\u00fctzen. Available online: https:\/\/www.aerzteblatt.de\/nachrichten\/103090\/Innovatives-IT-Verfahren-soll-sensible-Daten-in-der-Krebsforschung-schuetzen."},{"key":"ref_24","unstructured":"Ballhausen, H., von Maltitz, M., Niyazi, M., Kaul, D., Belka, C., and Carle, G. (2019, January 27\u201329). Secure Multiparty Computation in Clinical Research and Digital Health. Proceedings of the E-Science-Tage 2019, Heidelberg, Germany."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"e22158","DOI":"10.2196\/22158","article-title":"A Privacy-Preserving Log-Rank Test for the Kaplan-Meier Estimator With Secure Multiparty Computation: Algorithm Development and Validation","volume":"9","author":"Ballhausen","year":"2021","journal-title":"JMIR Med. Inform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Keller, M. (2020, January 9\u201313). MP-SPDZ: A Versatile Framework for Multi-Party Computation. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Virtual Event.","DOI":"10.1145\/3372297.3417872"},{"key":"ref_27","unstructured":"Keller, M., Pastro, V., and Rotaru, D. (May, January 29). Overdrive: Making SPDZ Great Again. Proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Tel Aviv, Israel."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Keller, M., and Scholl, P. (2014, January 7\u201311). Efficient, Oblivious Data Structures for MPC. Proceedings of the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), Kaoshiung, Taiwan.","DOI":"10.1007\/978-3-662-45608-8_27"},{"key":"ref_29","unstructured":"Niebuhr, C. (2023, August 23). Daten tauschen und sch\u00fctzen\u2014Das muss kein Widerspruch sein. Available online: https:\/\/merton-magazin.de\/daten-tauschen-und-schuetzen-das-muss-kein-widerspruch-sein."},{"key":"ref_30","unstructured":"(2021, September 22). LMU-Forschende mit Ideen zu Innovation und Bildung Erfolgreich. Available online: https:\/\/www.lmu.de\/de\/newsroom\/newsuebersicht\/news\/lmu-forschende-mit-ideen-zu-innovation-und-bildung-erfolgreich.html."},{"key":"ref_31","unstructured":"(2023, August 16). Federated Secure Computing. Available online: https:\/\/www.stifterverband.org\/wirkunghoch100\/3projekte\/computing."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/10\/4\/83\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:15:08Z","timestamp":1760130908000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/10\/4\/83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":31,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["informatics10040083"],"URL":"https:\/\/doi.org\/10.3390\/informatics10040083","relation":{},"ISSN":["2227-9709"],"issn-type":[{"type":"electronic","value":"2227-9709"}],"subject":[],"published":{"date-parts":[[2023,10,31]]}}}