{"id":5570,"date":"2025-10-01T12:54:22","date_gmt":"2025-10-01T10:54:22","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/"},"modified":"2025-10-01T12:54:55","modified_gmt":"2025-10-01T10:54:55","slug":"neue-wege-fuer-sichere-datenverarbeitung","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/","title":{"rendered":"New ways for secure data processing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Cyberagentur presents &#8220;Encrypted Computing&#8221; research program in Halle<\/strong><\/h2>\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-1024x577.jpg\" class=\"attachment-large size-large\" alt=\"Prof. Dr. J\u00fcrgen Freudenberger er\u00f6ffnete das Fach-Event zum Forschungsprogramm \u201eEncrypted Computing\u201c (EC2) in Halle.\" srcset=\"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-1024x577.jpg 1024w, \/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-330x186.jpg 330w, \/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-768x433.jpg 768w, \/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-1536x865.jpg 1536w, \/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-2048x1154.jpg 2048w, \/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-512x288.jpg 512w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Prof. Dr. J\u00fcrgen Freudenberger er\u00f6ffnete das Fach-Event zum Forschungsprogramm \u201eEncrypted Computing\u201c (EC2) in Halle.<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>On September 30, 2025, the Agentur f\u00fcr Innovation in der Cybersicherheit presented the &#8220;Encrypted Computing&#8221; (EC2) research program at a specialist event in Halle (Saale). Around 40 participants from project partners, academia, consumers and students from Martin Luther University Halle-Wittenberg took the opportunity to gain insights into current research approaches and fields of application. <\/strong><\/p>\n\n<p>The EC2 program aims to keep data encrypted even while it is being processed. Methods such as Fully Homomorphic Encryption (FHE) and Secure Multi-Party Computation (MPC) are intended to make it possible to evaluate information without revealing its confidentiality. In addition, concepts such as Private Set Intersection (PSI) and Private Information Retrieval (PIR) were presented, which were developed for the confidential comparison and retrieval of data.  <\/p>\n\n<p>Prof. Dr. J\u00fcrgen Freudenberger, Head of the Cyberagentur&#8217;s Key Technology Department, opened the event with an overview of the program&#8217;s strategic aims. Keynote speaker Prof. Dr. Zolt\u00e1n Mann, Professor of Cybersecurity, then emphasized that encrypted data processing is a key technology for securing trust in an increasingly digitalized world threatened by quantum computers. <\/p>\n\n<p>The participating project teams took the opportunity to present their research work. Prof. Dr. Antonia Wachter-Zeh, holder of the Chair of Codes and Cryptography at the Technical University of Munich, and Dr.-Ing. Hannes Bartz, Head of the Quantum-Resistant Cryptography Group at the German Aerospace Center, provided insights into the PQPrime project. Here, homomorphic encryption methods are being optimized for practical use and new cryptographic methods are being developed.<\/p>\n\n<p>The MPCC project was presented by Dr. Sebastian Gajek, founder and CEO of enclaive GmbH, and Prof. Dr. Peter Scholl, Professor of Cryptography at Aarhus University. They explained how secure multi-party computation based on trusted execution environments and secret sharing methods creates frameworks that enable analyses on sensitive data without disclosing it. <\/p>\n\n<p>The second day focused entirely on the presentations of the users, who introduced themselves and their use cases. Among them were the Federal Office for Information Security (BSI) and the Bundeswehr Center for Cyber Security (ZCSBw). <\/p>\n\n<p>The two-day event made it clear that the EC2 research program goes beyond pure basic research. Perspectives were presented on how encrypted data processing can be used in areas such as healthcare, administration and defense and what contribution it makes to the digital sovereignty of Germany and Europe. <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\"><strong>Further information and registration:<\/strong><\/h3>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/en\/ec2-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cyberagentur.de\/programme\/ec2<\/a><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberagentur presents &#8220;Encrypted Computing&#8221; research program in Halle On September 30, 2025, the Agentur f\u00fcr Innovation in der Cybersicherheit presented the &#8220;Encrypted Computing&#8221; (EC2) research program at a specialist event in Halle (Saale). Around 40 participants from project partners, academia, consumers and students from Martin Luther University Halle-Wittenberg took the opportunity to gain insights into [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":5568,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New ways for secure data processing - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New ways for secure data processing - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Cyberagentur presents &#8220;Encrypted Computing&#8221; research program in Halle On September 30, 2025, the Agentur f\u00fcr Innovation in der Cybersicherheit presented the &#8220;Encrypted Computing&#8221; (EC2) research program at a specialist event in Halle (Saale). Around 40 participants from project partners, academia, consumers and students from Martin Luther University Halle-Wittenberg took the opportunity to gain insights into [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-01T10:54:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T10:54:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"New ways for secure data processing\",\"datePublished\":\"2025-10-01T10:54:22+00:00\",\"dateModified\":\"2025-10-01T10:54:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/\"},\"wordCount\":404,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20250930-EC2-Event-scaled.jpg\",\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/\",\"name\":\"New ways for secure data processing - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20250930-EC2-Event-scaled.jpg\",\"datePublished\":\"2025-10-01T10:54:22+00:00\",\"dateModified\":\"2025-10-01T10:54:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20250930-EC2-Event-scaled.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20250930-EC2-Event-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Prof. Dr. J\u00fcrgen Freudenberger er\u00f6ffnete das Fach-Event zum Forschungsprogramm \u201eEncrypted Computing\u201c (EC2) in Halle.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/neue-wege-fuer-sichere-datenverarbeitung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New ways for secure data processing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New ways for secure data processing - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/","og_locale":"en_GB","og_type":"article","og_title":"New ways for secure data processing - Cyberagentur","og_description":"Cyberagentur presents &#8220;Encrypted Computing&#8221; research program in Halle On September 30, 2025, the Agentur f\u00fcr Innovation in der Cybersicherheit presented the &#8220;Encrypted Computing&#8221; (EC2) research program at a specialist event in Halle (Saale). Around 40 participants from project partners, academia, consumers and students from Martin Luther University Halle-Wittenberg took the opportunity to gain insights into [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/","og_site_name":"Cyberagentur","article_published_time":"2025-10-01T10:54:22+00:00","article_modified_time":"2025-10-01T10:54:55+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg","type":"image\/jpeg"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"New ways for secure data processing","datePublished":"2025-10-01T10:54:22+00:00","dateModified":"2025-10-01T10:54:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/"},"wordCount":404,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/","name":"New ways for secure data processing - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg","datePublished":"2025-10-01T10:54:22+00:00","dateModified":"2025-10-01T10:54:55+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#primaryimage","url":"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg","contentUrl":"\/wp-content\/uploads\/2025\/10\/20250930-EC2-Event-scaled.jpg","width":2560,"height":1442,"caption":"Prof. Dr. J\u00fcrgen Freudenberger er\u00f6ffnete das Fach-Event zum Forschungsprogramm \u201eEncrypted Computing\u201c (EC2) in Halle."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/neue-wege-fuer-sichere-datenverarbeitung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"New ways for secure data processing"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=5570"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5570\/revisions"}],"predecessor-version":[{"id":5571,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5570\/revisions\/5571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/5568"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=5570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=5570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=5570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}