Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography

Subscribers:
351,000
Published on ● Video Link: https://www.youtube.com/watch?v=c6RKETvuZKU



Duration: 2:03:15
797 views
6


Predicate Encryption Emily Shen, MIT Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f; the user learns whether the data satisfies the predicate, i.e., whether f(x) = 1. This talk will survey recent results in this area, and present some ideas behind one of the constructions. Structured Encryption and Controlled Disclosure Seny Kamara, Microsoft Research We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryptio (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another application, which we introduce in this work, is to the problem of controlled disclosure, where a data owner wishes to grant access to only part of a massive data set. Joint work with Melissa Chase Cloud Cryptography: A new era for cryptographic research Giuseppe Atteniese, Johns Hopkins University Let's face it: hundreds of elegant cryptographic schemes have been devised in the last 30 years but only encryption and authentication are deployed in practice. Cloud computing and storage are expected to change this status quo. The Cloud represents an incredible business opportunity but only if users will be in control of their data. In this talk, we will briefly highlight the opportunities the Cloud offers to cryptographers, then we will cover some recent results in the areas of Provable Data Possession and Proxy Re-encryption.




Other Videos By Microsoft Research


2016-08-17National Renewable Energy Lab, renewable energy and the compute space
2016-08-17Insights into Ad-sponsored Mobile Software
2016-08-17End-User Creation of Mashups and Cross-Device UI Prototypes
2016-08-17Fully Homomorphic Encryption; Bi-Deniable Encryption; We Have The Technology, Now Where Next?
2016-08-17Verifying Safety and Liveness Properties of a Kernelized Web Browser
2016-08-17The successes and challenges of making low-data languages in online automatic translation portals
2016-08-17Optimal Auctions with Budget Constraints
2016-08-17Proof of Aldous' spectral gap conjecture
2016-08-17Why Social Computing Is So Hard
2016-08-17Metastabiity and logarithmic energy barriers for a polymer dynamics
2016-08-17Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography
2016-08-17Approximation Schemes for Optimization
2016-08-17All pairs shortest path in quadratic time with high probability
2016-08-17Steering and Capturing Human Insight for Large-Scale Learning of Visual Objects
2016-08-17Welcome and opening remarks; Point Obfuscation and Friends; Outsourcing Computation
2016-08-17Laser Processing of Materials III
2016-08-17Finding all min st-cuts in planar graphs
2016-08-17GenoZoom: Browsing the genome with Microsoft Biology Foundation, DeepZoom and Silverlight
2016-08-17Robust Face Recognition Using Recognition-by-Parts, Boosting, and Transduction
2016-08-17Laser Processing of Materials II
2016-08-17The double dimer model with quaternions



Tags:
microsoft research