EN FR
EN FR


Section: Partnerships and Cooperations

National Collaborations with Academics

EnBiD: Encryption for Big Data

  • Program: ANR JCJC

  • Duration: October 2014 – September 2019

  • PI: Hoeteck Wee

  • Partners: Université Paris 2, Université Limoges

  • The main objective of this project is to study techniques for efficient and expressive functional encryption schemes. Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data in the cloud.

EfTrEC: Efficient Transferable E-Cash

  • Program: ANR JCJC

  • Duration: October 2016 – December 2019

  • PI: Georg Fuchsbauer

  • Partners: Université Paris 2

  • This project deals with e-cash systems which let users transfer electronic coins between them offline. The main objectives of this project are:

    • establish a clean formal model for the primitive;

    • construct schemes which are practically efficient;

    • develop schemes that are resistant to attacks on quantum computers.

SaFED: Safe and Functional Encrypted Databases

  • Program: ANR JCJC

  • Duration: October 2019 – Septembre 2023

  • PI: Brice Minaud

  • Partners: ENS, DGA

  • This project addresses the security of encrypted databases, with the proposal of new searchable encryption techniques and deeper security analysis.

ALAMBIC: AppLicAtions of MalleaBIlity in Cryptography

  • Program: ANR PRC

  • Duration: October 2016 – September 2020

  • PI: Damien Vergnaud

  • Partners: ENS Lyon, Université Limoges

  • The main objectives of the proposal are the following:

    • Define theoretical models for “malleable” cryptographic primitives that capture strong practical attacks (in particular, in the settings of secure computation outsourcing, server-aided cryptography, cloud computing and cryptographic proof systems);

    • Analyze the security and efficiency of primitives and constructions that rely on malleability;

    • Conceive novel cryptographic primitives and constructions (for secure computation outsourcing, server-aided cryptography, multi-party computation, homomorphic encryption and their applications);

    • Implement these new constructions in order to validate their efficiency and effective security.