Seny Kamara

Researcher, Microsoft Research

email: senyk@microsoft.com
twitter: @senykam
blog: outsourcedbits.org
pub key: B80B 84AC 9C5D 174D


I am a Researcher in the Cryptography Group at Microsoft Research (Redmond Lab). My research is focused on designing and analyzing cryptographic algorithms, protocols and systems; often motivated by privacy issues in cloud computing, surveillance and databases. I maintain interests in various aspects of theory and systems, including applied and theoretical cryptography, data structures and algorithms, cloud computing, databases, game theory and economics, coding theory, technology policy and networking.


Curriculum vitae: pdf (August 2015)

Encrypted search

Much of my work has revolved around the problem of encrypted search and the design and analysis of structured encryption schemes; that is, encryption schemes that support efficient searching on encrypted data. Structured encryption has applications to the way we store and process data, and can enable the design of systems that are both privacy-enhancing and usable. A long-term goal of this area is to fundamentally change the way we design systems for web mail, hosted mail, cloud storage, electronic medical records and databases, just to name a few examples.

For an introduction to encrypted search and to structured encryption see this survey (pdf), this series of blog posts (1, 2, 3, 4, 5) and this tutorial (pdf).

Surveillance

I am interested in how national security and privacy can be reconciled through the use of advanced cryptography. I first wrote about this in July 2013 (blog post). I later gave a keynote and wrote a paper outlining a privacy-preserving alternative to the NSA bulk collection program (slides and paper).

Secure multi-party computation

We are exploring the extent to which cloud computing can improve the practicality and scalability of secure multi-party computation by considering a setting where parties can outsource their work to an untrusted cloud provider. Our initial work on this model can be found in [13]. More efficient protocols and experimental results appear in [14].


Recent Publications (full list)




Recent Talks & Lectures (full list)




Program (co-)chair:

  • ACM Cloud Computing Security Workshop (CCSW '12)
  • Workshop on Surveillance and Technology (SAT '15)
Events (co-)organized: Invited speaker:

I have worked with the following outstanding group of students:

If you are interested in an internship in the Crypto Group, please read the following post (blog) and send me or any other group member an email.

Program committees:
 
  • Crypto and Network Security (CANS '09, '10, '12, '13)
  • Selected Areas in Cryptography (SAC '11)
  • Applied Cryptography & Network Security (ACNS '09, '11)
  • Stabilization, Safety, and Security of Distributed Systems (SSS '10)
  • Practice and Theory in Public-key Cryptography (PKC '09)


Contact Us Terms of Use Trademarks Privacy Statement © Microsoft Corporation. All rights reserved.Microsoft