Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography: A new era for cryptographic research

Predicate Encryption
Emily Shen, MIT
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate f; the user learns whether the data satisfies the predicate, i.e., whether f(x) = 1. This talk will survey recent results in this area, and present some ideas behind one of the constructions.
Structured Encryption and Controlled Disclosure
Seny Kamara, Microsoft Research
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryptio (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another application, which we introduce in this work, is to the problem of controlled disclosure, where a data owner wishes to grant access to only part of a massive data set.
Joint work with Melissa Chase
Cloud Cryptography: A new era for cryptographic research
Giuseppe Atteniese, Johns Hopkins University
Let’s face it: hundreds of elegant cryptographic schemes have been devised in the last 30 years but only encryption and authentication are deployed in practice.
Cloud computing and storage are expected to change this status quo. The Cloud represents an incredible business opportunity but only if users will be in control of their data.
In this talk, we will briefly highlight the opportunities the Cloud offers to cryptographers, then we will cover some recent results in the areas of Provable Data Possession and Proxy Re-encryption.

Date:
Speakers:
Emily Shen, Seny Kamara, and Giuseppe Atteniese
    • Portrait of Jeff Running

      Jeff Running

    • Portrait of Seny Kamara

      Seny Kamara

      Researcher