Skip to main content

Functional Encryption Technologies

Deliverables

First version of the privacy enhanced digital currency prototype

A first prototype implementing the core features of the privacy enhanced digital currency prototype, following the specification from D7.1, which should be sufficient to start the testing phase.

First version of the IoT key distribution prototype

A first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase.

First version of the truly anonymous data collection prototype

A first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase.

Annual Communication Activities Report Y1

This deliverable describes the communication activities that were carried out during the first project year.

Project Advisory Board Workshop Reports Y2

These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results.

Annual Dissemination Report & Material Y1

This deliverable describes the dissemination activities and material that were carried out and produced during the first year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities.

Annual Communication Activities Report Y2

This deliverable describes the communication activities that were carried out during the second project year.

Preliminary specification of FENTEC prototypes

Preliminary specification of the desired outcome, the environment, and the performance goal for privacy-preserving data collection, IOT and data analytics prototype.

Project Advisory Board Workshop Reports Y1

These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results.

Annual Report on Functional Encryption schemes with richer Functionality Y1

This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis.

Legal Requirement Analysis Report

This Deliverable will present an overview of the applicable ethical and legal framework, as well as relevant privacy, data protection and security principles. It will identify the requirements that are to be met by the technologies developed as part of the project and provide high level guidelines on how compliance can be realized and risks might be mitigated in order to ensure that fundamental principles are accounted for following the Privacy-by-Design methodology.

Security and Trust Models

This deliverable describes the requirements for hardware-supported functional encryption schemes, including trust, adversary, and security models from the analysis of Task 5.1.

Preliminary Report on Information Leakage Countermeasures

This Deliverable describes the methods and techniques to formally analyse the information leakage in FE schemes, most notably those developed in Task 4.1 to 4.3, and minimize it.

Annual Report on post-quantum safe Functional Encryption schemes Y2

This Deliverable describes the quantum-safe FE constructions along a formal security analysis.

Dissemination Plan

This deliverable describes specific plans for dissemination of the results of the project. It will help in coordinating the dissemination activities so that they ensure maximal impact for the results of the project.

Annual Report on Functional Encryption schemes for Prototypes Y3

This Deliverable describes the FE constructions for the specific use cases being considered in the FENTEC project along a formal security analysis.

Final specification of FENTEC prototypes

Re-specification of the desired outcome, the environment, and the performance goal for the prototypes. The technical report will describe the final features that will be implemented, including quantifiable information such as number of users/devices, frequency of API calls.

Preliminary Standardisation Report

This deliverable describes the activities regarding standardisation that were carried out during the first 18 months of the project and summarises the plans and actions for these activities for the rest of the project.

Annual Dissemination Report & Material Y2

This deliverable describes the dissemination activities and material that were carried out and produced during the second year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities

Annual Report on post-quantum safe Functional Encryption schemes Y1

This Deliverable describes the quantum-safe FE constructions along a formal security analysis.

Legal Framework Report

This will focus on providing more detailed methods of implementing the abovementioned requirements. They will be based on continuous cooperation with the technical partners and will reflect ongoing developments in both the project as well as in the European policy and legal framework. The legal requirements on privacy, data protection, security and ethics, as identified in Task 3.3 will herein be applied to specific FENTECH scenarios on the basis of the provided use cases. A requirements monitoring table will be developed.

Final Report on Hardware-optimized schemes

This deliverable describes the results of the work on the hardware-optimized schemes (Task 5.2) obtained until M28. This final report includes descriptions of the hardware implementations of the functional encryption schemes developed by FENTEC and novel methods and techniques (both architectural and algorithmic) for their efficient computation.

Exploitation Plan

This deliverable, also including an initial market analysis, describes the preliminary plans (consortium/project-wide as well as partner-specific) for exploitation activities that will be carried out for the results of the project (M24).

Annual Report on Functional Encryption schemes with richer Functionality Y2

This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis.

Final Functional Encryption Toolset API

This deliverable will be the API implementation of the schemes designed in the project. (D6.3) This deliverable also will contain documentation on how to use the API along some code examples.

Functional Encryption Toolset API Design

This deliverable will provide a design of the API and report on the implementation of the existing functional encryption schemes.

Public Web Presence

This deliverable is the website of the project that includes both public website that provides public information about FENTEC, the partners, and the results of the project as well as a private site where the partners can communicate and share project related information to each other and the project advisory board.

Searching for OpenAIRE data...

Publications

Obfuscating Simple Functionalities from Knowledge Assumptions

Author(s): Ward Beullens, Hoeteck Wee
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 254-283
DOI: 10.1007/978-3-030-17259-6_9

Unbounded Inner-Product Functional Encryption with Succinct Keys

Author(s): Edouard Dufour-Sans, David Pointcheval
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 426-441
DOI: 10.1007/978-3-030-21568-2_21

Decentralizing Inner-Product Functional Encryption

Author(s): Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 128-157
DOI: 10.1007/978-3-030-17259-6_5

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings

Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627
DOI: 10.1007/978-3-319-96884-1_20

Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding

Author(s): Jie Chen, Junqing Gong, Hoeteck Wee
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 673-702
DOI: 10.1007/978-3-030-03329-3_23

Public Key Compression for Constrained Linear Signature Schemes

Author(s): Ward Beullens, Bart Preneel, Alan Szepieniec
Published in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 300-321
DOI: 10.1007/978-3-030-10970-7_14

Decentralized Multi-Client Functional Encryption for Inner Product

Author(s): Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 703-732
DOI: 10.1007/978-3-030-03329-3_24

Unbounded ABE via Bilinear Entropy Expansion, Revisited

Author(s): Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 503-534
DOI: 10.1007/978-3-319-78381-9_19

Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality

Author(s): Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 127-148
DOI: 10.1007/978-3-030-12612-4_7

Public-Key Encryption, Revisited: Tight Security and Richer Functionalities

Author(s): Romain Gay
Published in: Cryptography and Security [cs.CR]. PSL Research University, 2019. English, Issue 3, 2019

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura

Author(s): ATOS
Published in: 2018

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras

Author(s): ATOS
Published in: 2018

Atos lidera un proyecto para securizar los datos en redes no seguras

Author(s): ATOS
Published in: 2018

En marcha el proyecto FENTEC para compartir datos de forma segura a través de redes no seguras

Author(s): ATOS
Published in: 2018

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (4)

Author(s): ATOS
Published in: 2018

Proyecto FENTEC: compartir datos de forma segura a través de redes no seguras

Author(s): ATOS
Published in: 2018

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (3)

Author(s): ATOS
Published in: 2018

ENS Paris, FUAS, HU, ATOS, WALLIX PhD, Post-Docs, and Software Engineers in Functional Encryption

Author(s): FENTEC Consortium
Published in: 2018

Un nuevo proyecto permite compartir datos en redes no seguras

Author(s): ATOS
Published in: 2018

FENTEC, proyecto europeo que desarrollará nuevos sistemas de encriptación funcionales

Author(s): ATOS
Published in: 2018

Proyecto FENTEC: compartir datos de forma segura a través de redes no seguras.

Author(s): ATOS
Published in: 2018

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (2)

Author(s): ATOS
Published in: 2018

FENTEC Use Cases

Author(s): FENTEC Consortium
Published in: 2018

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (4)

Author(s): ATOS
Published in: 2019

El proyecto europeo FENTEC desarrollará nuevos sistemas de encriptación

Author(s): ATOS
Published in: 2019

Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (5)

Author(s): ATOS
Published in: 2019

Big data' Encriptación modulable, ¿la alternativa al ‘blockchain’?

Author(s): ATOS
Published in: 2019

Atos Trabaja Para Compartir Datos De Forma Segura A Través De Redes No Seguras

Author(s): ATOS
Published in: 2019

Fentec permitirá transmitir datos seguros a través de redes inciertas

Author(s): ATOS
Published in: 2019

Compartir datos de forma segura a través de redes no seguras

Author(s): ATOS
Published in: 2019

Kudelski Security Announces FENTEC Participation to Develop New Functional Encryption Technologies

Author(s): Kudelski
Published in: 2019

December 2018 Newsletter

Author(s): ATOS
Published in: 2018

FENTEC team on the Spanish radio

Author(s): ATOS
Published in: 2019

Our first infographic is out now!

Author(s): ATOS
Published in: 2019

Atos Functional Encryption: an alternative to blockchain? the first blog post for the Fentec blog on the website

Author(s): Miguel Angel Mateo (ATOS)
Published in: 2019

Increasing Trustworthiness of ICT solutions by developing Functional Encryption Technologies

Author(s): FENTEC
Published in: 2018

Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme

Author(s): Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Published in: Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19, 2019, Page(s) 1-6
DOI: 10.1145/3316781.3317887

emmy: Trust-Enhancing Authentication Library

Author(s): Miha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, and Tilen Marc
Published in: 2019

Saber on ARM: CCA-secure module lattice-based key encapsulation on ARM

Author(s): Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy and Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue Volume 2018, Issue 3, 2018, Page(s) 243-266, ISSN 2569-2925
DOI: 10.13154/tches.v2018.i3.243-266