Explore the words cloud of the aSCEND project. It provides you a very rough idea of what is the project "aSCEND" about.
The following table provides information about the project.
Coordinator |
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE CNRS
Organization address contact info |
Coordinator Country | France [FR] |
Total cost | 1˙253˙892 € |
EC max contribution | 1˙253˙892 € (100%) |
Programme |
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC)) |
Code Call | ERC-2014-STG |
Funding Scheme | ERC-STG |
Starting year | 2015 |
Duration (year-month-day) | from 2015-06-01 to 2021-05-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE CNRS | FR (PARIS) | coordinator | 1˙253˙892.00 |
Recent trends in computing have prompted users and organizations to store an increasingly large amount of sensitive data at third party locations in the cloud outside of their direct control. Storing data remotely poses an acute security threat as these data are outside our control and could potentially be accessed by untrusted parties. Indeed, the reality of these threats have been borne out by the Snowden leaks and hundreds of data breaches each year. In order to protect our data, we will need to encrypt it.
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data in the cloud. Functional encryption also enables searches on encrypted travel records and surveillance video as well as medical studies on encrypted medical records in a privacy-preserving manner; we can give out restricted secret keys that reveal only the outcome of specific searches and tests. These mechanisms allow us to maintain public safety without compromising on civil liberties, and to facilitate medical break-throughs without compromising on individual privacy.
The goals of the aSCEND project are (i) to design pairing and lattice-based functional encryption that are more efficient and ultimately viable in practice; and (ii) to obtain a richer understanding of expressive functional encryption schemes and to push the boundaries from encrypting data to encrypting software. My long-term vision is the ubiquitous use of functional encryption to secure our data and our computation, just as public-key encryption is widely used today to secure our communication. Realizing this vision requires new advances in the foundations of functional encryption, which is the target of this project.
year | authors and title | journal | last update |
---|---|---|---|
2017 |
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee Conditional Disclosure of Secrets via Non-linear Reconstruction published pages: 758-790, ISSN: , DOI: 10.1007/978-3-319-63688-7_25 |
Advances in Cryptology - CRYPTO 2017 | 2019-10-10 |
2016 |
Hoeteck Wee Déjà Q: Encore! Un Petit IBE published pages: 237-258, ISSN: , DOI: 10.1007/978-3-662-49099-0_9 |
TCC 2016-A | 2019-10-10 |
2017 |
Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi Access Control Encryption for Equality, Comparison, and More published pages: 88-118, ISSN: , DOI: 10.1007/978-3-662-54388-7_4 |
PKC 2017 | 2019-10-10 |
2017 |
Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee Multi-input Inner-Product Functional Encryption from Pairings published pages: 601-626, ISSN: , DOI: 10.1007/978-3-319-56620-7_21 |
Advances in Cryptology - EUROCRYPT 2017 | 2019-10-10 |
2017 |
Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee Private Constrained PRFs (and More) from LWE published pages: 264-302, ISSN: , DOI: 10.1007/978-3-319-70500-2_10 |
TCC 2017 | 2019-10-10 |
2016 |
Brakerski, Zvika; Cash, David; Tsabary , Rotem; Wee, Hoeteck Targeted Homomorphic Attribute-Based Encryption published pages: , ISSN: , DOI: 10.1007/978-3-662-53644-5_13 |
TCC 2016-B | 2019-10-10 |
2018 |
Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates published pages: 577-607, ISSN: , DOI: 10.1007/978-3-319-96881-0_20 |
CRYPTO | 2019-10-10 |
2018 |
Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee Towards Breaking the Exponential Barrier for General Secret Sharing published pages: 567-596, ISSN: , DOI: 10.1007/978-3-319-78381-9_21 |
EUROCRYPT | 2019-10-10 |
2018 |
Romain Gay, Lucas Kowalczyk, Hoeteck Wee Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys published pages: 123-139, ISSN: , DOI: 10.1007/978-3-319-98113-0_7 |
SCN | 2019-10-10 |
2018 |
Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee Unbounded ABE via Bilinear Entropy Expansion, Revisited published pages: 503-534, ISSN: , DOI: 10.1007/978-3-319-78381-9_19 |
EUROCRYPT | 2019-10-10 |
2018 |
Georg Fuchsbauer, Michele Orrù Non-interactive Zaps of Knowledge published pages: 44-62, ISSN: , DOI: 10.1007/978-3-319-93387-0_3 |
ACNS | 2019-10-10 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "ASCEND" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "ASCEND" are provided by the European Opendata Portal: CORDIS opendata.
A need for speed: mechanisms to coordinate protein synthesis and folding in metazoans
Read MoreUnderstanding how mitochondria compete with Toxoplasma for nutrients to defend the host cell
Read MoreJust because we can, should we? An anthropological perspective on the initiation of technology dependence to sustain a child’s life
Read More