PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

21Jun

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

Title CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle Authors Thomas Lorünser (AIT), Thomas Länger (UNIL), Henrich Poehls and Leon Sell (PASSAU) Abstract Application development for the cloud is already challenging because of the complexity caused by the...

Details
Rasta: A cipher with low ANDdepth and few ANDs per bit

15May

Rasta: A cipher with low ANDdepth and few ANDs per bit

Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize multiplications in one way or another. In this paper, we propose with Rasta a design strategy...

Details
Providing secure mechanisms to protect personal data in a mobility platform

15May

Providing secure mechanisms to protect personal data in a mobility platform

Security and privacy preserving methods need to be developed to facilitate cloud usage even for organisations dealing with sensitive information and maintaining security critical services. A reasonable way to achieve the required security properties for outsourced data storage and...

Details
Engineering Cryptography for Security and Privacy in the Cloud

19Apr

Engineering Cryptography for Security and Privacy in the Cloud

We published an article in ERCIM News Magazine No. 113 April 2018, titled "Engineering Cryptography for Security and Privacy in the Cloud". The article can be found in ERCIM News No. 113 online edition  

Details
A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications

05Apr

A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications

Title A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications Authors Jakob Stangl (TU Wien) , Thomas Lorünser (AIT Austrian Institute of Technology), Sai Dinakarrao (TU Wien) Abstract Outsourcing data into the cloud gives wide benefits...

Details
Highly-Efficient Fully-Anonymous Dynamic Group Signatures

05Apr

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Group signatures are a central tool in privacy-enhancing cryptography, which allow members of a group to anonymously produce signatures on behalf of the group. Consequently, they are an attractive means to implement privacy-friendly authentication mechanisms. Ideally, group signatures are...

Details
D7.9 Second release of software modules for use case integration and validation

28Mar

D7.9 Second release of software modules for use case integration and validation

This report provides the final overview of the work done in the frame of task T7.4 - Software development of framework and components to realize use cases. This is the third report of the task, an iteration over deliverable...

Details
D5.11 Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

28Mar

D5.11 Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users. The purpose of this deliverable is to extend the architecture...

Details
Einsetzbare Kryptografie für die Cloud

09Mar

Einsetzbare Kryptografie für die Cloud

Title Einsetzbare Kryptografie für die Cloud Authors Henrich C. Pöhls (University of Passau) and Thomas Länger (University of Laussane) Abstract tba Journal  Zeitschrift für Datenrecht und informationssicherheit (digma). Jahrgang 17, Heft 1, März 2017

Details
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

05Mar

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoors (CHET; Camenisch et al., PKC 17) allow prohibiting that the holder of the...

Details

Element

Become a Member


Continue