PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
UniGuard: Protecting Unikernels using Intel SGX

16Jan

UniGuard: Protecting Unikernels using Intel SGX

Title UniGuard: Protecting Unikernels using Intel SGX Authors Ioannis Sfyrakis, Thomas Groß Abstract Computations executed in lightweight virtual machines called unikernels have a minimal attack surface and improved performance. However, unikernels are still prone to leaking information to the...

Details
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

16Jan

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Title Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange Authors David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks Abstract Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS...

Details
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

16Jan

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Title Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives Authors David Derler, Sebastian Ramacher, Daniel Slamanig Abstract  In this paper we address the construction of privacy-friendly cryptographic primitives for the post-quantum era and in...

Details
A Linearly Homomorphic Signature Scheme from Weaker Assumptions

08Jan

A Linearly Homomorphic Signature Scheme from Weaker Assumptions

Title A Linearly Homomorphic Signature Scheme from Weaker Assumptions Authors Lucas Schabhüser, Johannes Buchmann, Patrick Struck Abstract In delegated computing, prominent in the context of cloud computing, guaranteeing both the correctness and authenticity of computations is of critical importance. Homomorphic signatures can be used...

Details
Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

08Jan

Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs

Title Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs Authors David Derler, Daniel Slamanig Abstract Witness encryption (WE) is a recent powerful encryption paradigm, which allows to encrypt a message using the description of...

Details
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

14Dec

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Title Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications Authors David Derler (TUG), Stephan Krenn (AIT), Thomas Lorünser (AIT), Sebastian Ramacher (TUG), Daniel Slamanig (AIT), Christoph Striecks (AIT) Abstract We revisit the notion of proxy re-encryption (PRE), an...

Details
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

27Nov

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More

Title Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More Authors David Derler (IAIK, Graz University of Technology), Sebastian Ramacher (IAIK, Graz University of Technology), Daniel Slamanig (AIT Austrian Institute of Technology) Abstract Double-authentication-preventing signatures (DAPS) are signatures designed...

Details
D9.3 Dissemination and exploitation report 2

24Oct

D9.3 Dissemination and exploitation report 2

Contributing Partners ETRA, AIT, UNIL, UNI PASSAU Executive Summary  This deliverable presents the dissemination, communication, and exploitation activities of the PRISMACLOUD project for the second reporting period, following the strategy described in D9.2 Dissemination and exploitation report 1. There...

Details
D8.1 Specification of test-bed configurations for validation phase

24Oct

D8.1 Specification of test-bed configurations for validation phase

Contributing Partners ETRA, ATOS, LISPA, IRT Executive Summary Nowadays, big companies and public authorities are reluctant to entrust their most sensitive data to external parties for storage and processing, due there are no satisfactory approaches to adequately protect the...

Details
D7.8 First release of software modules for use case integration and validation

24Oct

D7.8 First release of software modules for use case integration and validation

Contributing Partners ETRA, IBM, TUGRAZ, AIT, UNI PASSAU Executive Summary  This report provides a second overview of the work done in the frame of task T7.4 - Software development of framework and components to realize use cases. This is...

Details

Element

Become a Member


Continue