{"id":1107918,"date":"2024-12-09T13:50:33","date_gmt":"2024-12-09T21:50:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/"},"modified":"2026-02-06T12:42:29","modified_gmt":"2026-02-06T20:42:29","slug":"msr-cryptography","status":"publish","type":"msr-group","link":"https:\/\/www.microsoft.com\/en-us\/research\/group\/msr-cryptography\/","title":{"rendered":"MSR Cryptography"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\"Security,\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Cryptography<\/h1>\n\n\n\n

Microsoft Research<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

The Cryptography team at Microsoft Research consists of researchers and engineers who make technology more secure, more trustworthy, and more private for every person and organization. Our focus is on cryptography, security, and privacy problems that are in the strategic path for Microsoft, our products and services, and our customers. Broader societal impact to improve trust and safety, to guarantee privacy, and to increase security is also important to us. We believe cryptographic tools and techniques should be made available and easy to use for everyone.<\/p>\n\n\n\n

We choose research problems with impact across one or more dimensions:<\/p>\n\n\n\n

    \n
  1. Core cryptography<\/strong>, cross-cutting work with broad impact.<\/li>\n\n\n\n
  2. Cryptography for industry<\/strong>, focused on problems that Microsoft, the tech industry, and\/or our business customers face.<\/li>\n\n\n\n
  3. Cryptography for society<\/strong>, working on problems that may not connect to an existing Microsoft business but where cryptography and cryptographic technology can contribute to solutions.<\/li>\n\n\n\n
  4. An emerging fourth dimension is problems for cryptography that arise from continued advances in AI<\/strong>.<\/li>\n<\/ol>\n\n\n\n

    Almost all of our research is public, and we regularly publish in top conferences in the field. We collaborate with researchers and students in academia and host interns every year through Microsoft’s internship program<\/a>. We build production-quality software libraries and release them under open-source licenses (typically MIT).<\/p>\n\n\n\n

    We host a bi-weekly Microsoft-internal Cryptography Talk Series, inviting professors, post-doc researchers, PhD students, industry researchers, and other experts to share their work. Some of these talks are made public on the Microsoft Research YouTube channel (playlist link (opens in new tab)<\/span><\/a>).<\/p>\n\n\n\n\n\n

    <\/p>\n\n\n\n

    <\/p>\n\n\n\n

    Data provenance.<\/strong> WRITE A FEW SENTENCES<\/p>\n\n\n\n

    End-to-end encryption.<\/strong> The fundamental problem in any end-to-end encrypted system is how the participants can obtain the correct public keys for other participants. In practice, it is nearly always the case that the service provides distributes the public keys, but since in the end-to-end encryption model the service provider is untrusted, the endpoints must verify that the keys they received are correct. There are several ways to do this, all with different technical difficulties and usability problems. We are working on new key verification ideas that can make end-to-end encryption safe and practical.<\/p>\n\n\n\n

    Identity and zero-knowledge proofs.<\/strong> WRITE A FEW SENTENCES<\/p>\n\n\n\n

    Post-quantum cryptography.<\/strong> <\/p>\n\n\n\n

    Reputation and accountability systems.<\/strong> While reputation systems are used ubiquitously on the Internet, they are failing to provide the kind of trust signal most people intuitively expect them to provide. In particular, reputation systems are vulnerable to manipulation and corruption; people using reputation systems may be subject to retaliation, since these systems typically provide no privacy guarantees. We are looking to create systems for measuring reputation and accountability that are more robust and come with formal integrity and privacy guarantees.<\/p>\n\n\n\n

    Verifiable election technologies.<\/strong> WRITE A FEW SENTENCES<\/p>\n\n\n\n\n\n

    Past interns to Microsoft Research Cryptography teams in Redmond include<\/p>\n\n\n\n