The HEAT project will develop advanced cryptographic technologies using Fully Homomorphic Encryption to process sensitive information in ecrypted form, without needing to compromise on the privacy and security of the citizens and organizations that provide the input data.
Who can I contact?
|Start:||January 1, 2015|
|End:||December 31, 2017|
Total cost of €4.16 Million (€4.16 Million EU-funded)
- 1st General Meeting, Leuven, Tuesday 20th October, 2015
- Summer school on FHE and Multilinear Maps, Paris, 12th-16th October 2015
- Technical Meeting, Paris, Friday 11th September, 2015
- Technical Meeting, Bristol, Friday 8th May, 2015
- Kick-off Meeting, Leuven, Friday 13th March, 2015
Meet the Holy Grail of cryptography.
Fully homomorphic encryption is the ultimate cryptographic tool to build more secure cloud computing services that respect everybody's privacy. It allows to confidentialy share data, and the encrypted data can then be processed without ever needing to decrypt or reveal it.
Our CEO is the main editor of the upcoming standard ISO/IEC 18033-6 on partially homomorphic encryption.
Homomorphic encryption is the future, and we can help you get there!
You are not prepared.
One day, quantum computers will become a reality. When that day comes, RSA, Elliptic Curves and many other fundamental cryptographic primitives will become obsolete. Post-Quantum Cryptography offers secure alternatives and we can help you get ready.
Related research project
A crypto-calculus platform for the Cloud.
The principle of cloud computing is to allow users to outsource computation resources to the cloud by allowing a remote service to execute, in their name, some procedures on their private data. While many commercial services are growing fast, to this day, all require the client to place total trust in the service regarding the confidentiality of their data. The aim of CRYPTOCOMP is to develop an efficient cloud-based crypto-calculus platform which, using the latest advances in Fully Homomorphic Encryption, would make it impossible for the cloud service to learn anything whatsoever about the user's data, while still executing the procedures as intended.
The HEAT project will develop advanced cryptographic technologies to process sensitive information in encrypted form, without needing to compromise on the privacy and security of the citizens and organizations that provide the input data.
The core technology is based on homomorphic cryptography, which allows to perform computations on encrypted information without decrypting it. The main goal of HEAT is to produce a step change in the efficiency and applicability of this technology.
The HEAT proposal brings together Europe’s leading researchers on homomorphic cryptography (KU Leuven, Belgium (Coordinator), University of Bristol, UK and University of Luxemburg, Luxemburg), with the leading expertise on lattice based cryptanalysis (Université Pierre et Marie Curie, France), and three industrial partners with existing interests in the field (CryptoExperts, France, NXP Semiconductors, Belgium and Thales UK, UK).
The proposed outputs of HEAT are an open source software library to support applications that wish to use homomorphic cryptography. The results of the HEAT project will be highly beneficial to European industry and academic research since they allow for using homomorphic cryptography to be used by a much wider variety of end developers.
OBJECTIVES AND EXPECTED OUTCOMES
The HEAT project envisions the following outcomes:
- Open source toolbox for SHE algorithms in SW and HW: The main deliverable will be an open source toolbox which implements a variety of SHE algorithms in both software and hardware. The goal is to provide a toolbox which can be utilized by others to experiment with and investigate the application of SHE technology within as wide a range of applications as possible.
- Security analysis and parameter recommendations: To better understand the hardness of the computational problems that underly SHE, HEAT will perform much needed cryptanalytic work. This will allow to better understand the long-term viability of this new form of encryption and to specify security parameters in a much more effective way than currently possible.
- Focus on real world applications with immediate impact: To validate the practicality of the developed technology in a range of applications, we will use the toolbox in three use cases. As such, we will examine how SHE technology can transform the three problem spaces not only by providing new functionalities but also by opening up new business opportunities.
- Enable knowledge transfer and exploitation: Cryptographic research, including research supported by the EU via projects such as ECRYPT, traditionally produces outputs that are primarily of academic interest. A strategic objective of the HEAT project is to enable knowledge transfer from such results into tools usable directly by non-expert software engineers.
- Improve European competitiveness in homomorphic cryptography: By bringing together Europe’s leading experts in this emerging field, and by focusing on a proactive external engagement and training effort, we will spread excellence throughout Europe and ensure we do not get left behind in this emerging technology.
The deliverables of HEAT will be available on HEAT website.
Related presentations & talks
CLT: Construction(s) and AttacksTancrède Lepoint.Summer school on Fully Homomorphic Encryption and Multilinear Maps, Paris, France, October 14, 2015.
Zeroizing Attacks on Multilinear Maps.Tancrède Lepoint.Workshop on Tools for Asymmetric Cryptanalysis, Bochum, Germany, October 08, 2015.
Multilinear Maps over the Integers: From Design to Security.Tancrède Lepoint.The Mathematics of Modern Cryptography Workshop, Berkeley, U.S.A., July 10, 2015.
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.In FSE 2016, 2016.
NFLlib: NTT-based Fast Lattice Library.In CT-RSA 2016, 2016.
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance.In ASIACRYPT (1) 2015, 2015. Best Paper Award
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.In CRYPTO (1) 2015, pp. 247-266, 2015.
New Multilinear Maps Over the Integers.In CRYPTO (1) 2015, pp. 267-286, 2015.
Cryptanalysis of the Co-ACD Assumption.In CRYPTO (1) 2015, pp. 561-580, 2015.