Products

Confidential Data Access

Attribute-based encryption (ABE) is cutting-edge cryptographic technology. But don’t worry, we have made it simple to use. Instead of encrypting your data with a single key, you can choose who will have access to what.

Products

Confidential Data Access

Attribute-based encryption (ABE) is cutting-edge cryptographic technology. But don’t worry, we have made it simple to use. Instead of encrypting your data with a single key, you can choose who will have access to what.

Confidential Data Access

One key for each usage

Your data are better protected: a single key cannot decrypt them.

Confidential Data Access

One key for each usage

Your data are better protected: a single key cannot decrypt them.

Confidential Data Access

Granular control of your data access policy

Attribute-based encryption supports monotone boolean operations (AND and OR).

Confidential Data Access

Granular control of your data access policy

Attribute-based encryption supports monotone boolean operations (AND and OR).

Confidential Data Access

Client-side encryption

Use our libraries to encrypt and decrypt your data close to where they are.

Confidential Data Access

Client-side encryption

Use our libraries to encrypt and decrypt your data close to where they are.

Confidential Data Access

KMS included

Manage your keys easily with our KMIP compatible KMS.

Confidential Data Access

KMS included

Manage your keys easily with our KMIP compatible KMS.

Confidential Data Access

Smart attributes

Attributes can be hierarchical (for security level) or non-hierarchical (for business units, departments, countries…)

Confidential Data Access

Smart attributes

Attributes can be hierarchical (for security level) or non-hierarchical (for business units, departments, countries…)

Confidential Data Access

Protection against cyber threats

Access control attributes are embedded in the data in the ciphertext itself: far more secure protection against cyber attacks centralized access solutions.

Confidential Data Access

Protection against cyber threats

Access control attributes are embedded in the data in the ciphertext itself: far more secure protection against cyber attacks centralized access solutions.

How it works

Cosmian Confidential Data Access is a set of API and libraries that makes attribute-based encryption (ABE) easy to implement.

ABE is a cutting-edge cryptography technique that allows you to encrypt your data and define your access policy thanks to attributes.

This is your data

These data need to be encrypted.

Step 1: encryption

With Cosmian Confidential Data Access API and libraries, you can encrypt data with different keys in the same dataset.

Step 2: key distribution

We provide everything you need to generate and distribute the right key to the right user (following KMIP protocol).

Step 3: decryption

You now have a fine-grained data access policy, backed by cryptography.
Users can only decrypt what they are supposed to see.

Ready to try?

Sign-up below to be informed about product updates, new cryptographic libraries & more. Let’s stay in touch.

Advanced cryptography at the service of confidential computing & data privacy.

Advanced cryptography at the service of confidential computing & data privacy.

How to secure computation and explicitly control access to sensitive data in cloud environments

Cosmian makes no tracking for advertising and does not collect any personal data. Cookies are used for statistical or operational purposes, as well as for analysis, allowing for continuous improvement of the website. Cosmian uses the Matomo Analytics tool, an audience measurement solution that uses cookies with a configuration that complies with the data protection legislation and the recommendations of the CNIL (Commission Nationale de l'Informatique et des Libertés). This configuration allows to anonymise visitor's data and to limit the storage period of this data to a maximum of 13 months. With this configuration, the prior consent to the deposit of Matomo Analytics cookies is not required. However, you can still choose not to allow these cookies (by clicking here ) or at any time by consulting our Privacy Policy.

For more information please consult our Privacy Policy