Confidential Computing and Privacy-preserving Technologies for 6G

CONFIDENTIAL6G will develop cryptographic quantum-resistant protocols and security proofs tools, libraries, mechanism and architectural blueprints for confidentiality in 6G.

Cryptography

 

Cryptographic enablers for confidential computing (FHE, SMPC, TEE) and post-quantum networking. DLT privacy enablers (ZKP). Support for emdedded edge devices and HW.

 

Confidential Computing

 

Confidential Computing via FHE, SMPC and HW TEEs. Colaborative AI/ML. Confidential containers. Remote attestations. Secure enclave abstractions. Secure key distribution.

 

Confidential Networking

 

Post-quantum secure network protocols. Secure data sharing and access control. Private blockchain Smart Contracts, DIDs and VCs. Federated AI/ML orchestration.

CONFIDENTIAL6G will research post-quantum cryptography (PQC) in order to create tools, libraries, SDKs and other artifacts needed for future 6G technologies

5

Domain #1

Confidential Computing Enablers

Confidential Computing enablers: Lattice-based cryptography for Fully Homomorphic Encryption, Secure Multi-party Computation, TEE attestation handling, collaborative AI/ML

5

Domain #2

Secure Communication Enablers

Confidential Communication enablers: PQC TLS and other protocols10, Blockchain-based data exchange, Zero-knowledge Proofs (ZKPs), confidential Smart Contracts, Decentralised Identifiers (DIDs) and Verifiable Credentials (VCs), and a new concept of Anonymous Credentials (AC)

5

Domain #3

IoT Security Enablers

Confidential Edge and IoT enablers: embedded FHE, PQC for constrained devices, large-scale networks of connected devices involved in federated learning and cryptography necessary to support this.

IN A NUTSHELL

In CONFIDENTIAL6G, our goal is to ensure secure and private computation in the cloud-edge continuum of 6G by developing modern cryptographic techniques, tools, and libraries. We recognize the importance of implementing privacy preservation and security of data in heterogeneous environments and contexts, and thus, we prioritize researching security enablers. We aim to tackle the potential danger posed by near-future quantum computers, which can break contemporary encryptions, by exploring novel cryptographic operations

13 PARTNERS    

Consortium combines the industrial expertise from industry, SMEs and academic and research excellence

10 DIFFERENT COUNTRIES

including Austria, Estonia, Germany, Greece, Ireland, France, Spain, Netherlands, Finland and Serbia.

5 MIL EUR

CONFIDENTIAL6G project is financed by EU Commission with the total budget of 5 mil EU.

Project Partners

We are proud to collaborate with a diverse group of project partners who share our vision and commitment to excellence.

Latest News

Protecting Privacy in the 6G Era – Are We Ready?

 

As 6G networks take shape, they are expected to handle vast amounts of personal and industrial data. These networks will power everything from AI-driven smart cities to automated healthcare systems and real-time industrial monitoring. However, with this increase in connectivity comes greater security and privacy risks…

Ana Kovačević, from Zentrix Lab, Presents Research on Secure Automotive OTA Firmware Updates

 

Ana Kovačević from Zentrix Lab, a partner in the CONFIDENTIAL6G project, was invited to speak at the Seminar on Computer Science and Applied Mathematics at the Mathematical Institute of the Serbian Academy of Sciences on February 18, 2025…

Advancing Telecom Security with Confidential6G Use Case 2

 

Telecom networks are evolving rapidly, bringing new challenges in securing sensitive data and workloads. Use Case 2 of the Confidential6G project focuses on addressing these challenges by implementing advanced technologies like confidential computing…

Subscribe to Newsletter

Enter your email to get notified with the latest news and events