Technology

It’s mathe-magics!

It’s mathe-magics!

State-of-Art encryption techniques now allow for processing calculations over sensitive data without ever accessing nor exposing the data in clear text.

Secure Enclave

A Secure Enclave is an isolated hardware environment where code and data are completely isolated from other applications. Processes running on the same device or server have no access to the secure partition.

Main advantages of a secure enclave rather than software isolation are a better protection against software attacks and a clearer security software architecture.

Attribute-based Encryption

Attribute based encryption (ABE) is a generalization of public encryption schemes that gives a way to target the group of people who are authorized to decrypt.

In key-policy ABE, an access policy is encoded into the user’s secret key and ciphertexts are associated with a set of attributes.

In ciphertext-policy ABE, the secret key is associated with a set of attributes and the access policy is encoded in the ciphertext at the encryption time.

Searchable Symmetric Encryption

Searchable Symmetric Encryption is a cryptographic protocol designed to securely make search queries on an untrusted cloud server. Hence, databases can securely be outsourced without compromising their usability.
After a search request, the cloud server can answer the list of the all the entries matching the requested keyword without knowing neither the keyword nor the entries as everything is encrypted.

Secure Multi-Party Computation

Secure Multi-party Computation is a set of techniques allowing several entities to jointly compute results on their inputs without revealing their individual data to others.
This tool is particularly useful when the different entities must remain cautious about the other participants even if they want to cooperate on a computation.

Functional Encryption

Functional Encryption is a cryptographic technique that enables entities to execute specific operations on encrypted data – and output the result in clear, but it will never reveal the inputs of the computation nor the intermediate values.
Performing computations on the data and obtaining the results of these computations is allowed only to authorized entities by data owner who will generate specific keys associated to specific computations.

Fully Homomorphic Encryption

Fully Homomorphic Encryption is a form of encryption that allows to perform operations on ciphertexts without having access to the underlying source data or manipulating any secret key.
Results of these computations are also encrypted and only data provider having the secret key is able to decrypt them. This technique does not require any trusted authority to distribute the keys, the entities act independently, not assuming any trusted party.
More on Cosmian Github
Secure Enclave

A Secure Enclave is an isolated hardware environment where code and data are completely isolated from other applications. Processes running on the same device or server have no access to the secure partition.

Main advantages of a secure enclave rather than software isolation are a better protection against software attacks and a clearer security software architecture.

Attribute-based Encryption

Attribute based encryption (ABE) is a generalization of public encryption schemes that gives a way to target the group of people who are authorized to decrypt.

In key-policy ABE, an access policy is encoded into the user’s secret key and ciphertexts are associated with a set of attributes.

In ciphertext-policy ABE, the secret key is associated with a set of attributes and the access policy is encoded in the ciphertext at the encryption time.

Searchable Symmetric Encryption

Searchable Symmetric Encryption is a cryptographic protocol designed to securely make search queries on an untrusted cloud server. Hence, databases can securely be outsourced without compromising their usability.
After a search request, the cloud server can answer the list of the all the entries matching the requested keyword without knowing neither the keyword nor the entries as everything is encrypted.

Secure Multi-Party Computation

Secure Multi-party Computation is a set of techniques allowing several entities to jointly compute results on their inputs without revealing their individual data to others.
This tool is particularly useful when the different entities must remain cautious about the other participants even if they want to cooperate on a computation.

Functional Encryption

Functional Encryption is a cryptographic technique that enables entities to execute specific operations on encrypted data – and output the result in clear, but it will never reveal the inputs of the computation nor the intermediate values.
Performing computations on the data and obtaining the results of these computations is allowed only to authorized entities by data owner who will generate specific keys associated to specific computations.

Fully Homomorphic Encryption

Fully Homomorphic Encryption is a form of encryption that allows to perform operations on ciphertexts without having access to the underlying source data or manipulating any secret key.
Results of these computations are also encrypted and only data provider having the secret key is able to decrypt them. This technique does not require any trusted authority to distribute the keys, the entities act independently, not assuming any trusted party.

More on Cosmian Github
Academic Community

Partnering with world-renowned cryptographic academic teams to release game-changing products.

Academic Community

We partner with world-renowned cryptographic academic teams

Technology Partnerships

We focus to deliver value and innovation to best-in-class Technology Ecosystems.

Get Started

Ubiquitous Encryption: secure your data everywhere, at all times.

Ubiquitous
Encryption for
Privacy-by-default.

Cosmian makes no tracking for advertising and does not collect any personal data. Cookies are used for statistical or operational purposes, as well as for analysis, allowing for continuous improvement of the website. Cosmian uses the Matomo Analytics tool, an audience measurement solution that uses cookies with a configuration that complies with the data protection legislation and the recommendations of the CNIL (Commission Nationale de l'Informatique et des Libertés). This configuration allows to anonymise visitor's data and to limit the storage period of this data to a maximum of 13 months. With this configuration, the prior consent to the deposit of Matomo Analytics cookies is not required. However, you can still choose not to allow these cookies (by clicking here ) or at any time by consulting our Privacy Policy.

For more information please consult our Privacy Policy