Unlocking Privacy with Predicate Encryption & Cloud Cryptography π
Discover how predicate encryption and structured encryption enable fine-grained access control and secure data sharing in cloud environments. Learn from MIT expert Emily Shen about cutting-edge cryptographic techniques for privacy and security.

Microsoft Research
896 views β’ Aug 17, 2016

About this video
Predicate Encryption Emily Shen, MIT Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f; the user learns whether the data satisfies the predicate, i.e., whether f(x) = 1. This talk will survey recent results in this area, and present some ideas behind one of the constructions. Structured Encryption and Controlled Disclosure Seny Kamara, Microsoft Research We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryptio (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another application, which we introduce in this work, is to the problem of controlled disclosure, where a data owner wishes to grant access to only part of a massive data set. Joint work with Melissa Chase Cloud Cryptography: A new era for cryptographic research Giuseppe Atteniese, Johns Hopkins University Let's face it: hundreds of elegant cryptographic schemes have been devised in the last 30 years but only encryption and authentication are deployed in practice. Cloud computing and storage are expected to change this status quo. The Cloud represents an incredible business opportunity but only if users will be in control of their data. In this talk, we will briefly highlight the opportunities the Cloud offers to cryptographers, then we will cover some recent results in the areas of Provable Data Possession and Proxy Re-encryption.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
896
Likes
6
Duration
02:03:15
Published
Aug 17, 2016
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now