of an encryption-based service architecture in an untrusted two-party environment We analyze the foundations of trust in … that can be carried out within the framework. - Design, analysis and implementation of an aggregation-based service … architecture in an untrusted three-party environment Using a privacy-compromising health report as a running example through the …