Functional Encrypted Secure Systems

Date: 
01/12/2016 to 30/11/2019

Traditional public-key encryption is an invaluable tool for the Web and is used by billions of users everyday for secure communication. Notwithstanding, traditional public-key encryption is an all-or-nothing concept: if you have the secret-key you can decrypt the ciphertext, otherwise you can not recover any information of the encrypted plaintext.This is becoming a limitation nowadays.In fact, the Internet 2.0 is moving towards the emerging paradigm of cloud computing, in which the users delegate their data to a cloud server and need to compute functions over the encrypted data.For these applications the notion of traditional encryption is unsatisfactory.When the data are encrypted the server needs a secret key to decrypt them but giving the secret key to the server enables it to learn all information not just the result of the computation over the encrypted data, as the users wish.Functional cryptography allows to selectively control the amount of information that the users can decrypt, thus enabling novel and powerful applications. Using Functional Encryption, Alice can publish a public-key that her colleagues can use to send to her Gmail’s account encrypted emails. If the emails were encrypted with traditional encryption schemes Gmail could not perform any meaningful operation, but if the emails are encrypted with a functional encryption system, Alice can give to Gmail a token for functions of her choice, for example a function that forwards messages coming from Bob to another account or discards messages coming from Eve. Google can apply this token to the encrypted data to compute what Alice wishes (e.g., forwarding a message to Bob or discarding a message).Moreover Google will only leak a minimal amount of information (e,g., whether a message have to be discarded) but not all the content of the encrypted messages.Software obfuscation is a tightly related primitive that allows to “obfuscate” a computer program so as to make it sufficiently unintelligible while preserving its functionality.This primitive was shown to be impossible to achieve in general but only recently in a breakthrough Garg, Gentry, Raykova, Halevi, Sahai and Waters constructed a variant of it that is called indistinguishability obfuscation and showed its tremendous power and in subsequent works many open problems in cryptography were solved using it.In this project, we will try to advance the area of functional cryptography and software obfuscation by tackling known problems, proposing and solving new ones, and finding new applications for these powerful primitives.In particular we identified several research directions in this area, specifically variants of functional encryption and related primitives, deniable cryptography, and definitional issues for functional encryption.

Week: 
Monday, 10 December, 2018

Project type:

News

SMESEC project Open Call for SMEs and SME associations
SMESEC has released an open call for SMEs and SME associations in order to validate SMESEC framework and at the same time improve their systems’ security.
 
SMESEC is inviting SMEs to participate in the validation of the SMESEC framework. By participating you not only have influence on the evaluation of the SMESEC framework, but also improve your own company security and get up to €20.000 of funds!

Future Events

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.

CYBERUK 2019
24/04/2019 to 25/04/2019
Image:

Where: Scottish Event Campus (SEC), Glasgow
When: 24-25 April 2019
 
CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must respond as individuals and as a community to keep Britain safe in cyberspace.