Hi [[ session.user.profile.firstName ]]

More Advanced Cryptography - Fully Homomorphic Encryption

More Advanced Cryptography - Fully Homomorphic Encryption
Recorded Jun 23 2020 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kirsty Paine, Moderator, Ilaria Chillotti, Mariya Georgieva
Presentation preview: More Advanced Cryptography - Fully Homomorphic Encryption

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • TTCN-3 language extensions object-oriented features Oct 9 2020 8:00 am UTC 75 mins
    Jens Grabowski, Axel Rennoch, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The new TTCN-3 extension “Object-oriented features” introduces the concepts “classes”, “objects” and “exception handling” into the TTCN-3 language. Even though some of these concepts have been implemented implicitly in the TTCN-3, the concepts are now integrated explicitly into the language allowing a new style of test specification that provides new ways of designing abstract data types, in the form of user defined classes, and integrating external data by means of external classes. This presentation informs TTCN-3 users, test engineers and test managers about the newest developments of the language.
  • TTCN-3 general concepts and applications Oct 6 2020 8:00 am UTC 75 mins
    Axel Rennoch, Jens Grabowski, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The Testing and Test Control Notation TTCN-3 is the only standardized test specification and implementation language used in industry and research to define and execute different types of tests in multiple domains like e.g. telecommunication or automotive. The notation supports an abstract description of test scenarios. Due to multiple tool support, including powerful open source projects, it is successfully worldwide in use e.g. for testing and certification of mobile phones by 3GPP or the oneM2M products. The presentation introduces the goals, technical concepts and various applications of the TTCN-3 technology.
  • Boost innovation and create business opportunities with mobile edge computing Oct 1 2020 1:00 pm UTC 90 mins
    Nurit Sprecher, Dave Bolan, Omar Elloumi, Alex Reznik, Surish Chitturi
    Mobile edge computing is a keystone of the Ultra-Reliable, Low Latency Connectivity (URLLC) and the digital transformation and mobilization of the enterprise industries. It also enables a new class of premium applications that require real-time delivery of live and on-demand content as well as a high degree of interactivity, for example: gaming, 360 video delivery, AR/VR, etc. ETSI ISG MEC and 3GPP have both worked on their own architectures for edge computing within the boundaries of their different scopes. Their common purpose, however, is to create an open and standardized IT service environment for hosting and supporting third-party applications in edge clouds while also leveraging the underlying network infrastructure. In order to accelerate time-to-market and promote industry adoption, it is essential to ensure alignment, leverage synergies and offer common practices and tools for the developers. This will foster innovation and enable the developers to write a single application software module that can run on every edge environment, and support the GSMA requirements for federation.
    The speakers will review the emerging mobile edge computing use cases and the recently updated 5-year mobile edge computing market forecast from DellOro. They will also highlight the role of standards, the value proposition of the different standards streams and will show how those standards can complement each other when it comes to operational deployments. Some deployment scenarios will also be introduced.
  • TETRA to 2035 and beyond Sep 10 2020 1:00 pm UTC 90 mins
    Brian Murgatroyd, TC TCCE Chair, David Chater-Lea, Jeppe Jepson
    TETRA to 2035 and beyond. Marketing overview, InteropTesting, TETRA and standards development, packet date enhancements, TETRA security, interworking with critical communications broadband systems
  • More Advanced Cryptography - Fully Homomorphic Encryption Recorded: Jun 23 2020 64 mins
    Kirsty Paine, Moderator, Ilaria Chillotti, Mariya Georgieva
    More Advanced Cryptography - Fully Homomorphic Encryption
  • ETSI Security Week:Industry Applications and Use Cases for Advanced Cryptography Recorded: Jun 19 2020 99 mins
    François Ambrosini,, Moderator, Scott Cadzow, Dr. Yang Cui, Dr. Jinguang Han
    The benefits of Advanced Cryptography are recognised by ETSI, as its members make developments and standards in Identity-Based Cryptography, Attribute-Based Encryption and other forms of Advanced Cryptography. This session focuses on applications of Advanced Cryptography, including a privacy-preserving electronic ticket scheme using attribute-based credentials to protect users' privacy, and a survey on how Attribute-Based Encryption could be deployed to protect mobile networks.
  • ETSI Security Week: Fully Homomorphic Encryption Recorded: Jun 18 2020 2 mins
    Kirsty Paine, Moderator
    Homomorphic encryption is one of the technologies allowing the public cloud to operate on secret data without leaking any information about the data. In these two talks, the speakers give a general overview of the capabilities of homomorphic encryption and of the general security model. They will detail some of the tools and technologies that make it usable for concrete use-cases and share the latest advances in practical homomorphic encryption with a strong emphasis on applications to deep learning.
  • ETSI Security Week: Security Challenges and Regulatory Aspects Recorded: Jun 18 2020 89 mins
    Bengt Sahlin, Moderator, Tomasz Osko, David Soldani
    This session discusses security challenges due to new technological advancements, and discussed regulatory aspects related to 5G security
  • ETSI Security Week: 5G Network Certification Recorded: Jun 17 2020 98 mins
    Colin Whorlow, Moderator, Domenico Ferrara, Sven Lachmund, Goran Milenkovic, Marcus Wong
    This webinar will provide a status of the policy and industry actions to enable effective security of and trust in 5G networks.
  • ETSI Security Week: 5G Security Evolution Recorded: Jun 16 2020 97 mins
    Noamen Ben Henda, Moderator, Takahito Yoshikawa, James Skuse
    This session includes presentations on the most recent 5G security features, and efforts within the industry for continuous improvement of 5G security.
  • SKINNY LATTE: Scalable Hierarchical Identity Based Encryption over Lattices Recorded: Jun 15 2020 42 mins
    Kirsty Paine, Moderator, Sarah Mc Carthy,
    The ETSI-standardised TETRA communications system is used for instantaneous communication within emergency services and for military personnel. Whilst considering its transition to the PS-LTE network, it was proposed that identity-based encryption (IBE) could be used as a low latency solution. However, the scheme which was considered, MIKEY-SAKKE, is not resistant to quantum computing attacks.
  • ETSI Security Week: ETSI Standardisation in Advanced Cryptography Recorded: Jun 11 2020 85 mins
    François Ambrosini, Moderator, Christoph Striecks,
    The academic community and the industry thrive with innovative cryptography that enable advanced access control and secure communication use cases. Functional Encryption is one such family of schemes. This session will introduce Attribute-Based Encryption (ABE), Identity-Based Encryption (IBE), and their related standardisation efforts in ETSI, including a quantum-safe hierarchical IBE scheme.
    ABE is a cryptographic mechanism that enforces access control solely on the mathematical level with strong security guarantees. A main incentive using ABE is to provide a proper and versatile replacement for software-only access-control mechanisms that need to embed all trust into (often seen to be error-prone) software components by design. Applications of ABE in EU research projects and ETSI TS 103 532 will be presented.
    IBE is a form of asymmetric encryption in which the participants’ identities (such as a phone number or an email address) serve as public keys. Participants wishing to securely communicate can do so directly, without having to aggree on keying material beforehand. IBE is well suited for the seamless onboarding of participants in cases where the task of establishing secure communications can be delegated to a trusted third party. The properties of IBE schemes will be summarised and the study conducted in ETSI TR 103 719 will be presented.
    As quantum computing poses a threat to the long-term security of most of the currently used encryption mechanisms, this session will also present ongoing efforts in the development of quantum-safe IBE, with a focus on a hierarchical IBE scheme based on structured lattices and described in ETSI TR 103 618.
  • ETSI Security Week: Consumer IoT Security - Certification Schemes Recorded: Jun 11 2020 92 mins
    Sonia Compans, Moderator, David Mudd, Roland Atoui, Juhani Eronen, Jamie Randall, Alex Buchan, Laurens Vanoijen
    Product assurance schemes play an important role in consumer IoT security. Typically, they provide a consumer-facing assurance label or kitemark which demonstrates that the product has undergone independent testing or a robust self-assessment process, thus helping consumers make security-conscious purchasing decisions. Assessment feedback can also be communicated privately to manufacturers to help them improve their product. But operating an assurance scheme for consumer IoT can be challenging, not least due to the broad diversity of relevant products and the rapid innovation in this space.
    This webinar panel features speakers with experience in this area. It will consider options for managing these challenges and look ahead to a possible IoT security certification scheme under the EU Cybersecurity Act.
  • ETSI Security Week: Consumer IoT security standards Recorded: Jun 11 2020 62 mins
    Jasper Pandza, Moderator, Gisela Meister
    A significant proportion of consumer Internet of Things (IoT) or ‘smart’ products currently on the market lack basic cyber security provisions. ETSI TC CYBER has developed European Standard (EN) 303 645 “Cyber Security for Consumer Internet of Things: Baseline Requirements”, which is expected to be published in July, to bring together widely considered good security / privacy practice for consumer IoT devices. The EN has been developed in collaboration with CEN/CENELEC JTC 13 experts. It is expected to inform the development of new legislation on IoT security in Europe and beyond.

    TC CYBER is also taking forward TS 103 701, which will set out test scenarios for assessing products against EN 303 645. It is to set out mandatory and recommended assessments, as well as guidance and examples to support their implementation. The document is intended to be used by testing labs and certifying bodies that provide assurance on the security of relevant products, as well as manufacturers that wish to carry out a self-assessment. The document is intended as input to a future EU common cybersecurity certification scheme as proposed in the Cybersecurity Act.
  • ETSI Security Week: 5G security for verticals Recorded: Jun 10 2020 89 mins
    Stefan Schroeder, Moderator, Ian Oliver, Rong Wu, Haitham Cruickshank
    The best-known security features of a 5G network ensure secure operation of a public network: strong subscriber authentication, protection against fraud and eavesdropping, secure billing, robust services etc. Security addresses the typical trust relation between network operators and their customers.
    5G applications and deployments in vertical industries have complementary security requirements and different multi-party trust models that need to be addressed in addition, often on top of the 5G network. Moreover, the 5G deployment models may be different from the usual public mobile network, ranging from non-public campus networks in factories, over specific network slices for safety-critical applications like healthcare or railways, up to global V2X networks for transport applications.
    The EU Toolbox of risk mitigating measures for 5G explicitly mentions the need to address the risk of exploitation of IoT, handsets or smart devices - i.e. the verticals' domain- in addition to the need to secure the network.
  • Insight into the First Steps of the Cybersecurity Act Reality Recorded: Jun 10 2020 94 mins
    Andreas Mitrakas, Moderator, Aristotelis.Tzafalias, Philippe Blot, Eric.Vetillard
    EC& ENISA will provide the progress of work on the first schemes being under preparation: Common Criteria and Cloud Security certification. They will share the lessons learnt from the preparation of those schemes. EC will also provide an update on the latest steps taken within the Cybersecurity Act, such as an overview of the first Rolling Work Programme, potential next schemes…..
  • SSP: The New Smart Secure Platform – The Technical Realisation Recorded: Jun 9 2020 64 mins
    Denis Praca, Moderator, Michele Berionne, Stéphane Schirar, Stéphane Bandin, Elder Dos Santos
    This session will cover in detail the published specifications ETSI TS 102 666-1 and -2 as well as the SPI protocol in ETSI TS 103 713 and will give an insight into the current work on the embedded SSP.
  • SSP: The New Smart Secure Platform – A High Level Introduction Recorded: Jun 9 2020 92 mins
    Klaus Vedder, Moderator, Davide Pratone, Sophie Diallo, Andreas Bertling, Denis Praca
    This session will give a high-level introduction into the reasons for developing this new security platform, its requirements and impact on the ecosystem as well as the current state of testing and why certification is needed.
  • ETSI Security Week: 5G Deployment Recorded: Jun 8 2020 83 mins
    Marcus Wong (Moderator), Silke Holtmanns, Pieter Veenstra
    5G poses a major architectural and functional change of a network. This move brings along many security questions and many have been tackled for the non-standalone or standalone architecture. We will discuss how to get securely from a 4G or non-standalone architecture to a standalone architecture. Different migration scenarios and architectures are described and what are the specific security aspects of it. This will be put into context with latest GSMA and 3GPP security approaches and features. Additionally, as we gain experience from the initial deployment and collect open issues related to standardization, operation, and implementation, we aim to provide an overview of practical guidelines and recommendations for mobile operators for the implementation of 5G networks.
  • Recent developments in RED & EMCD: How to make the best use of ETSI Recorded: May 11 2020 61 mins
    Dr Michael Sharpe, ETSI
    Wireless technology is becoming an ever-increasing part of our lives. The EMC Directive (2014/30/EU) and the Radio Equipment Directive (2014/53/EU) have now been in place for several years, but the technology and the regulatory environment are still developing rapidly. This webinar will give an overview of recent developments and identify how the more recent ETSI standards and other deliverables can be used to support manufacturers to demonstrate compliance and access the market in Europe.
In depth coverage of ETSI's standards
ETSI's webcasts cover all our standardization in telecommunications, radiocommunications and ICT. Find out more about our work and how you can get involved at www.etsi.org

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: More Advanced Cryptography - Fully Homomorphic Encryption
  • Live at: Jun 23 2020 2:15 pm
  • Presented by: Kirsty Paine, Moderator, Ilaria Chillotti, Mariya Georgieva
  • From:
Your email has been sent.
or close