Unlocking Privacy with Predicate Encryption & Cloud Cryptography πŸ”

Discover how predicate encryption and structured encryption enable fine-grained access control and secure data sharing in cloud environments. Learn from MIT expert Emily Shen about cutting-edge cryptographic techniques for privacy and security.

Unlocking Privacy with Predicate Encryption & Cloud Cryptography πŸ”
Microsoft Research
896 views β€’ Aug 17, 2016
Unlocking Privacy with Predicate Encryption & Cloud Cryptography πŸ”

About this video

Predicate Encryption Emily Shen, MIT Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f; the user learns whether the data satisfies the predicate, i.e., whether f(x) = 1. This talk will survey recent results in this area, and present some ideas behind one of the constructions. Structured Encryption and Controlled Disclosure Seny Kamara, Microsoft Research We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryptio (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another application, which we introduce in this work, is to the problem of controlled disclosure, where a data owner wishes to grant access to only part of a massive data set. Joint work with Melissa Chase Cloud Cryptography: A new era for cryptographic research Giuseppe Atteniese, Johns Hopkins University Let's face it: hundreds of elegant cryptographic schemes have been devised in the last 30 years but only encryption and authentication are deployed in practice. Cloud computing and storage are expected to change this status quo. The Cloud represents an incredible business opportunity but only if users will be in control of their data. In this talk, we will briefly highlight the opportunities the Cloud offers to cryptographers, then we will cover some recent results in the areas of Provable Data Possession and Proxy Re-encryption.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

896

Likes

6

Duration

02:03:15

Published

Aug 17, 2016

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now