Deliverables Demonstrators, pilots, prototypes (6) First version of the privacy enhanced digital currency prototype A first prototype implementing the core features of the privacy enhanced digital currency prototype, following the specification from D7.1, which should be sufficient to start the testing phase. First version of the IoT key distribution prototype A first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase. Final implementation of the IoT key distribution prototype The final implementation of the prototype should strictly adhere to the specification defined in D7.2. First version of the truly anonymous data collection prototype A first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase. Final implementation of the truly anonymous data collection prototype The final implementation of the prototype should strictly adhere to the specification defined in D7.2 Final implementation of the privacy enhanced digital currency prototype The final implementation of the privacy enhanced digital currency prototype should strictly adhere to the specification defined in D7.2. Documents, reports (35) Final Standardisation Report This deliverable describes the activities regarding standardisation that were carried out during the whole 38 months of the project and summarises the plans and actions for these activities for the rest of the project. Performance Analyses 2 Performance results will be reported and techniques used to improve the speed of the schemes will be described. Final Legal Compliance Report This deliverable will concern the legal validation and review of the data management in the project as well as its compliance with regulatory norms. It will serve as a final assessment of the project from a legal, privacy, security and ethical point of view and shall, if necessary, include further recommendations for future use of the developed technologies. Annual Communication Activities Report Y1 This deliverable describes the communication activities that were carried out during the first project year. Project Advisory Board Workshop Reports Y2 These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results. Annual Dissemination Report & Material Y1 This deliverable describes the dissemination activities and material that were carried out and produced during the first year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities. Final Report on Hardware-operated schemes This deliverable describes the results of the work on the hardware-operates schemes (Task 5.4) obtained until M30. These results include the design and specification to implement the required Functional Encryption schemes and modules on FPGAs. Annual Communication Activities Report Y3 This deliverable describes the communication activities that were carried out during the third project year. Annual Communication Activities Report Y2 This deliverable describes the communication activities that were carried out during the second project year. Exploitation Report This deliverable updates D2.13-D2.15 based on the finalised developments and validation of the FENTEC project, and includes a report on exploitation activities performed. It includes a definition of business models and commercialization strategies suitable for market adoption of efficient and application-oriented Functional Encryption technology in different market segments. Preliminary specification of FENTEC prototypes Preliminary specification of the desired outcome, the environment, and the performance goal for privacy-preserving data collection, IOT and data analytics prototype. Project Advisory Board Workshop Reports Y1 These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results. Annual Dissemination Report & Material Y3 This deliverable describes the dissemination activities and material that were carried out and produced during the third year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities. Annual Report on Functional Encryption schemes with richer Functionality Y1 This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis. Project Advisory Board Workshop Reports Y3 These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results. Legal Requirement Analysis Report This Deliverable will present an overview of the applicable ethical and legal framework, as well as relevant privacy, data protection and security principles. It will identify the requirements that are to be met by the technologies developed as part of the project and provide high level guidelines on how compliance can be realized and risks might be mitigated in order to ensure that fundamental principles are accounted for following the Privacy-by-Design methodology. Annual Report on post-quantum safe Functional Encryption schemes Y3 Annual Report on post-quantum safe Functional Encryption schemes Final Report on Information Leakage Countermeasures This Deliverable describes the methods and techniques to formally analyse the information leakage in FE schemes, most notably those developed in Task 4.1 to 4.3, and minimize it. Security and Trust Models This deliverable describes the requirements for hardware-supported functional encryption schemes, including trust, adversary, and security models from the analysis of Task 5.1. Preliminary Report on Information Leakage Countermeasures This Deliverable describes the methods and techniques to formally analyse the information leakage in FE schemes, most notably those developed in Task 4.1 to 4.3, and minimize it. Annual Report on post-quantum safe Functional Encryption schemes Y2 This Deliverable describes the quantum-safe FE constructions along a formal security analysis. Dissemination Plan This deliverable describes specific plans for dissemination of the results of the project. It will help in coordinating the dissemination activities so that they ensure maximal impact for the results of the project. Final Report on Security Tests This deliverable will give a final summary of the security of the implemented hardware modules in Tasks 5.2-4, collecting results and reporting preliminary and final conclusions from security tests. Annual Report on Functional Encryption schemes for Prototypes Y3 This Deliverable describes the FE constructions for the specific use cases being considered in the FENTEC project along a formal security analysis. Final specification of FENTEC prototypes Re-specification of the desired outcome, the environment, and the performance goal for the prototypes. The technical report will describe the final features that will be implemented, including quantifiable information such as number of users/devices, frequency of API calls. Final Report on Hardware-assisted schemes This deliverable describes the results of the work on the hardware-assisted schemes (Task 5.3) obtained until M29. This final report contains descriptions of the full hardware implementations of hardware-assisted functional encryption schemes and, in particular, the designs of the required hardware modules. Preliminary Standardisation Report This deliverable describes the activities regarding standardisation that were carried out during the first 18 months of the project and summarises the plans and actions for these activities for the rest of the project. Annual Dissemination Report & Material Y2 This deliverable describes the dissemination activities and material that were carried out and produced during the second year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities Annual Report on post-quantum safe Functional Encryption schemes Y1 This Deliverable describes the quantum-safe FE constructions along a formal security analysis. Annual Report on Functional Encryption schemes with richer Functionality Y3 This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis. Legal Framework Report This will focus on providing more detailed methods of implementing the abovementioned requirements. They will be based on continuous cooperation with the technical partners and will reflect ongoing developments in both the project as well as in the European policy and legal framework. The legal requirements on privacy, data protection, security and ethics, as identified in Task 3.3 will herein be applied to specific FENTECH scenarios on the basis of the provided use cases. A requirements monitoring table will be developed. Final Report on Hardware-optimized schemes This deliverable describes the results of the work on the hardware-optimized schemes (Task 5.2) obtained until M28. This final report includes descriptions of the hardware implementations of the functional encryption schemes developed by FENTEC and novel methods and techniques (both architectural and algorithmic) for their efficient computation. Final performance report for FENTEC prototypes after second cycle The report will measure and compare the performance of each prototype after the first implementation cycle, evaluating them in effective conditions, and validate the relevance and global objectives of the FENTEC project. Exploitation Plan This deliverable, also including an initial market analysis, describes the preliminary plans (consortium/project-wide as well as partner-specific) for exploitation activities that will be carried out for the results of the project (M24). Annual Report on Functional Encryption schemes with richer Functionality Y2 This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis. Other (2) Final Functional Encryption Toolset API This deliverable will be the API implementation of the schemes designed in the project. (D6.3) This deliverable also will contain documentation on how to use the API along some code examples. Functional Encryption Toolset API Design This deliverable will provide a design of the API and report on the implementation of the existing functional encryption schemes. Websites, patent fillings, videos etc. (1) Public Web Presence This deliverable is the website of the project that includes both public website that provides public information about FENTEC, the partners, and the results of the project as well as a private site where the partners can communicate and share project related information to each other and the project advisory board. Publications Conference proceedings (14) Compact and Programmable yet High-Performance SoC Architecture for Cryptographic Pairings Author(s): M. Bahadori, K. Järvinen Published in: 2020 Publisher: FPL 2020 Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography Author(s): Angshuman Karmakar, Jose Maria Bermudo Mera Published in: 2020 Publisher: TCHES 2020 Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism Author(s): Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede Published in: 2020 Publisher: DAC2020 Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model Author(s): Sebastian Gajek, Marco Lewandowsky Published in: 2020 Publisher: FPDAPP 2020 Dynamic Decentralized Functional Encryption Author(s): J. Chotard, E. Dufour Sans, R. Gay, D.H. Phan, D. Pointcheval Published in: 2020 Publisher: CRYPTO 2020 Inner-Product Functional Encryption with Fine-Grained Access Control Author(s): Michel Abdalla, Dario Catalano, Romain Gay and Bodgan Ursu Published in: 2020 Publisher: Advances in Cryptology – ASIACRYPT 2020 Increasing Trustworthiness of ICT solutions by developing Functional Encryption Technologies Author(s): FENTEC Published in: 2018 Publisher: fentec.eu Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme Author(s): Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede Published in: Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19, 2019, Page(s) 1-6, ISBN 9781-450367257 Publisher: ACM Press DOI: 10.1145/3316781.3317887 emmy: Trust-Enhancing Authentication Library Author(s): Miha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, and Tilen Marc Published in: 2019 Publisher: IFIPTM 2019 A Programmable SoC Implementation of the DGK Cryptosystem for Privacy-Enhancing Technologies Author(s): M. Bahadori, K. Järvinen Published in: 2020 Publisher: DSD/AHSA 2020 Privacy-Enhanced Machine Learning with Functional Encryption Author(s): Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak and Jolanda Modic Published in: 2019 Publisher: ESORICS 2019 The European Symposium on Research in Computer, Luxembourg Security A Side-Channel Resistant Implementation of SABER Author(s): Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede Published in: 2020 Publisher: ACM- Journal on Emerging Technologies in Computing Systems, 2020 Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model Author(s): Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner Published in: 2020 Publisher: SCN2020 Authentication in online payment under PSD2 and GDPR: a case of cumulative application Author(s): Danaja Fabčič Povše Published in: 2020 Publisher: IFIP summer school Other (36) FENTEC - Service Offer 2018 Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching FENTEC - functional encryption technologies Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching Privacy-Preserving Statistical Analysis Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching Privacy-Preserving and Auditable Digital Currency Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching Benchmarking Privacy-Preserving Motion Detection Author(s): Yolan Romailler, Nils Amiet (KUD) Published in: 2020 Publisher: KUD website Motion Detection and Local Decision Making Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching Atos lidera un proyecto europeo que permitirá compartir datos de forma segura Author(s): ATOS Published in: 2018 Publisher: BigData Magazine Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras Author(s): ATOS Published in: 2018 Publisher: El Candelero tecnológico Atos lidera un proyecto para securizar los datos en redes no seguras Author(s): ATOS Published in: 2018 Publisher: Computing En marcha el proyecto FENTEC para compartir datos de forma segura a través de redes no seguras Author(s): ATOS Published in: 2018 Publisher: Data Center Market Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (4) Author(s): ATOS Published in: 2018 Publisher: CyberSecurity News Proyecto FENTEC: compartir datos de forma segura a través de redes no seguras Author(s): ATOS Published in: 2018 Publisher: Redes Telecom Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (3) Author(s): ATOS Published in: 2018 Publisher: Atos Worlwide website ENS Paris, FUAS, HU, ATOS, WALLIX PhD, Post-Docs, and Software Engineers in Functional Encryption Author(s): FENTEC Consortium Published in: 2018 Publisher: Enpowerment for everyone Un nuevo proyecto permite compartir datos en redes no seguras Author(s): ATOS Published in: 2018 Publisher: IT User FENTEC, proyecto europeo que desarrollará nuevos sistemas de encriptación funcionales Author(s): ATOS Published in: 2018 Publisher: Conectrónica Proyecto FENTEC: compartir datos de forma segura a través de redes no seguras. Author(s): ATOS Published in: 2018 Publisher: Telemática y ciberseguridad Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (2) Author(s): ATOS Published in: 2018 Publisher: Digital affaires FENTEC Use Cases Author(s): FENTEC Consortium Published in: 2018 Publisher: fentec.eu Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (4) Author(s): ATOS Published in: 2019 Publisher: CyberSecurity News El proyecto europeo FENTEC desarrollará nuevos sistemas de encriptación Author(s): ATOS Published in: 2019 Publisher: Conectronica Atos lidera un proyecto europeo que permitirá compartir datos de forma segura a través de redes no seguras (5) Author(s): ATOS Published in: 2019 Publisher: Economía de hoy Big data' Encriptación modulable, ¿la alternativa al ‘blockchain’? Author(s): ATOS Published in: 2019 Publisher: Teleinterview for El País Atos Trabaja Para Compartir Datos De Forma Segura A Través De Redes No Seguras Author(s): ATOS Published in: 2019 Publisher: Cloud Computing Fentec permitirá transmitir datos seguros a través de redes inciertas Author(s): ATOS Published in: 2019 Publisher: Zona Movilidad Compartir datos de forma segura a través de redes no seguras Author(s): ATOS Published in: 2019 Publisher: Tecnonews Kudelski Security Announces FENTEC Participation to Develop New Functional Encryption Technologies Author(s): Kudelski Published in: 2019 Publisher: kudelskisecurity.com December 2018 Newsletter Author(s): ATOS Published in: 2018 Publisher: http://www.fentec.eu/ FENTEC team on the Spanish radio Author(s): ATOS Published in: 2019 Publisher: Cope Lleida Radio - fentec.eu Our first infographic is out now! Author(s): ATOS Published in: 2019 Publisher: fentec.eu Atos Functional Encryption: an alternative to blockchain? the first blog post for the Fentec blog on the website Author(s): Miguel Angel Mateo (ATOS) Published in: 2019 Publisher: fentec.eu Increasing Trustworthiness of ICT Solutions by Developing Functional Encryption Technologies Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching Rethinking Encryption To Enhance Security And Utility Author(s): FENTEC Consortium Published in: 2020 Publisher: Forbes Project of the week - FENTEC Author(s): FENTEC Consortium Published in: 2020 Publisher: Cyberwatching FENTEC 3rd Newsletter Author(s): FENTEC Consortium Published in: 2020 Publisher: FENTEC Consortium En marcha el proyecto FENTEC para compartir datos de forma segura a través de redes no seguras Author(s): ATOS Published in: 2020 Publisher: Data Center Market Non-peer reviewed articles (1) A Programmable SoC-Based Accelerator for Privacy-Enhancing Technologies and Functional Encryption Author(s): Milad Bahadori, Kimmo Jarvinen Published in: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Issue 28/10, 2020, Page(s) 2182-2195, ISSN 1063-8210 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/tvlsi.2020.3010585 Book chapters (10) Obfuscating Simple Functionalities from Knowledge Assumptions Author(s): Ward Beullens, Hoeteck Wee Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 254-283, ISBN 978-3-030-17258-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-17259-6_9 Unbounded Inner-Product Functional Encryption with Succinct Keys Author(s): Edouard Dufour-Sans, David Pointcheval Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 426-441, ISBN 978-3-030-21567-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-21568-2_21 Decentralizing Inner-Product Functional Encryption Author(s): Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 128-157, ISBN 978-3-030-17258-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-17259-6_5 Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627, ISBN 978-3-319-96883-4 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-96884-1_20 Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding Author(s): Jie Chen, Junqing Gong, Hoeteck Wee Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 673-702, ISBN 978-3-030-03328-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-03329-3_23 Public Key Compression for Constrained Linear Signature Schemes Author(s): Ward Beullens, Bart Preneel, Alan Szepieniec Published in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 300-321, ISBN 978-3-030-10969-1 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-10970-7_14 Decentralized Multi-Client Functional Encryption for Inner Product Author(s): Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 703-732, ISBN 978-3-030-03328-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-03329-3_24 Unbounded ABE via Bilinear Entropy Expansion, Revisited Author(s): Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 503-534, ISBN 978-3-319-78380-2 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-78381-9_19 Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality Author(s): Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 127-148, ISBN 978-3-030-12611-7 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-12612-4_7 Protecting Human Rights through a Global Encryption Provision Author(s): Danaja Fabčič Povše Published in: 2020 Publisher: Intersentia Thesis dissertations (1) Public-Key Encryption, Revisited: Tight Security and Richer Functionalities Author(s): Romain Gay Published in: Cryptography and Security [cs.CR]. PSL Research University, 2019. English, Issue 3, 2019 Publisher: PSL Research University Peer reviewed articles (1) Saber on ARM: CCA-secure module lattice-based key encapsulation on ARM Author(s): Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy and Ingrid Verbauwhede Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue Volume 2018, Issue 3, 2018, Page(s) 243-266, ISSN 2569-2925 Publisher: Ruhr-Universitat Bochum DOI: 10.13154/tches.v2018.i3.243-266 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available