Coordinatore | IBM RESEARCH GMBH
Spiacenti, non ci sono informazioni su questo coordinatore. Contattare Fabio per maggiori infomrazioni, grazie. |
Nazionalità Coordinatore | Switzerland [CH] |
Totale costo | 2˙467˙700 € |
EC contributo | 2˙467˙700 € |
Programma | FP7-IDEAS-ERC
Specific programme: "Ideas" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013) |
Code Call | ERC-2012-ADG_20120216 |
Funding Scheme | ERC-AG |
Anno di inizio | 2013 |
Periodo (anno-mese-giorno) | 2013-03-01 - 2018-02-28 |
# | ||||
---|---|---|---|---|
1 |
IBM RESEARCH GMBH
Organization address
address: SAEUMERSTRASSE 4 contact info |
CH (RUESCHLIKON) | hostInstitution | 2˙467˙700.00 |
2 |
IBM RESEARCH GMBH
Organization address
address: SAEUMERSTRASSE 4 contact info |
CH (RUESCHLIKON) | hostInstitution | 2˙467˙700.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
'The amount of personal data stored in digital form has grown tremendously. All aspects of our lives are concerned. Our data include family pictures, insurance documents, bills and receipts, health records, cryptographic keys, electronic identities, certificates, and passwords. We store and process them on several personal devices as well as in the cloud via services such as Flickr or Facebook. Managing these data is challenging: they have to be updated, backed up, synchronised across devices, and shared. In case of emergency, health records must be accessible to doctors or designated family members. Many of these data are sensitive, but adequately protecting them is virtually impossible for private users with current tools. Encrypting data makes managing them only harder. It destroys much of the functionality that users have come to expect such as synchronising and sharing; mismanagement of encryption keys might even render data illegible to the owner himself.
Our goal is to develop fundamentally new cryptographic primitives, protocols, and policy languages that let human users deal with cryptographic keys and encrypted personal data. We will invent mechanisms that 1) enable humans to securely store and retrieve cryptographic keys based on a single human-memorisable password, on biometrics, on hardware tokens; 2) enable end users to manage their various cryptographic keys and encrypted data via these keys; and 3) enable users and cloud hosts to perform useful operations on encrypted data without needing to decrypt. Our mechanisms will run on resource-constrained devices, i.e., they will be efficient and yet secure in the sense that they provide security guarantees, especially in the presence of untrusted cloud hosts.
Our basic cryptographic research aims at infusing growth of a research community around protection mechanisms for end-user keys and data and to initiate follow-up collaborative projects to deploy our theoretical results in the real world'