Technology

It’s mathe-magics!

State-of-Art encryption techniques now allow for processing calculations over sensitive data without ever accessing nor exposing the data in clear text.

Technology

It’s mathe-magics!

State-of-Art encryption techniques now allow for processing calculations over sensitive data without ever accessing nor exposing the data in clear text.

Explore our key technologies

Explore our key technologies

cosmian-technology-1
cosmian-technology-2

Attribute-based Encryption

Attribute based encryption (ABE) is a generalization of  public encryption schemes that gives a way to target the group of people who are authorized to decrypt.

In key-policy ABE, an access policy is encoded into the user’s secret key and ciphertexts are associated with a set of attributes.
In ciphertext-policy ABE, the secret key is associated with a set of attributes and the access policy is encoded in the ciphertext at the encryption time.

Secure Enclave

A Secure Enclave is an isolated hardware environment where code and data are completely isolated from other applications. Processes running on the same device or server have no access to the secure partition.

Main advantages of a secure enclave rather than software isolation are a better protection against software attacks and a clearer security software architecture.

Attribute-based Encryption

Attribute based encryption (ABE) is a generalization of  public encryption schemes that gives a way to target the group of people who are authorized to decrypt.

In key-policy ABE, an access policy is encoded into the user’s secret key and ciphertexts are associated with a set of attributes.
In ciphertext-policy ABE, the secret key is associated with a set of attributes and the access policy is encoded in the ciphertext at the encryption time.

Secure Enclave

A Secure Enclave is an isolated hardware environment where code and data are completely isolated from other applications. Processes running on the same device or server have no access to the secure partition.

Main advantages of a secure enclave rather than software isolation are a better protection against software attacks and a clearer security software architecture.

cosmian-technology-3
cosmian-technology-4

Searchable Symmetric Encryption.

Searchable Symmetric Encryption Cosmian

Searchable Symmetric Encryption is a cryptographic protocol designed to securely make search queries on an untrusted cloud server. Hence, databases can securely be outsourced without compromising their usability.
After a search request, the cloud server can answer the list of the all the entries matching the requested keyword without knowing neither the keyword nor the entries as everything is encrypted.

.

Secure Multi-Party Computation.

Secure Multi-party Computation is a set of techniques allowing several entities to jointly compute results on their inputs without revealing their individual data to others.

This tool is particularly useful when the different entities must remain cautious about the other participants even if they want to cooperate on a computation.

 

Searchable Symmetric Encryption.

Searchable Symmetric Encryption is a cryptographic protocol designed to securely make search queries on an untrusted cloud server. Hence, databases can securely be outsourced without compromising their usability.
After a search request, the cloud server can answer the list of the all the entries matching the requested keyword without knowing neither the keyword nor the entries as everything is encrypted.

Secure Multi-Party Computation.

Secure Multi-party Computation is a set of techniques allowing several entities to jointly compute results on their inputs without revealing their individual data to others.

This tool is particularly useful when the different entities must remain cautious about the other participants even if they want to cooperate on a computation.

cosmian-technology-5
cosmian-technology-6

Functional Encryption.

Functional Encryption is a cryptographic technique that enables entities to execute specific operations on encrypted data – and output the result in clear, but it will never reveal the inputs of the computation nor the intermediate values.

Performing computations on the data and obtaining the results of these computations is allowed only to authorized entities by data owner who will generate specific keys associated to specific computations.

Fully Homomorphic Encryption.

Fully Homomorphic Encryption

Fully Homomorphic Encryption is a form of encryption that allows to perform operations on ciphertexts without having access to the underlying source data or manipulating any secret key.

Results of these computations are also encrypted and only data provider having the secret key is able to decrypt them. This technique does not require any trusted authority to distribute the keys, the entities act independently, not assuming any trusted party.

.

Functional Encryption.

Functional Encryption is a cryptographic technique that enables entities to execute specific operations on encrypted data – and output the result in clear, but it will never reveal the inputs of the computation nor the intermediate values.

Performing computations on the data and obtaining the results of these computations is allowed only to authorized entities by data owner who will generate specific keys associated to specific computations.

Fully Homomorphic Encryption.

Fully Homomorphic Encryption is a form of encryption that allows to perform operations on ciphertexts without having access to the underlying source data or manipulating any secret key.

Results of these computations are also encrypted and only data provider having the secret key is able to decrypt them. This technique does not require any trusted authority to distribute the keys, the entities act independently, not assuming any trusted party.

Academic Community

We partner with world-renowned cryptographic academic teams

Academic Community

We partner with world-renowned cryptographic academic teams

Advanced cryptography at the service of confidential computing & data privacy.

Advanced cryptography at the service of confidential computing & data privacy.

How to secure computation and explicitly control access to sensitive data in cloud environments.

Cosmian makes no tracking for advertising and does not collect any personal data. Cookies are used for statistical or operational purposes, as well as for analysis, allowing for continuous improvement of the website. Cosmian uses the Matomo Analytics tool, an audience measurement solution that uses cookies with a configuration that complies with the data protection legislation and the recommendations of the CNIL (Commission Nationale de l'Informatique et des Libertés). This configuration allows to anonymise visitor's data and to limit the storage period of this data to a maximum of 13 months. With this configuration, the prior consent to the deposit of Matomo Analytics cookies is not required. However, you can still choose not to allow these cookies (by clicking here ) or at any time by consulting our Privacy Policy.

For more information please consult our Privacy Policy