PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

13Jul

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

Title Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems Authors Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Denise Demirel, Reza Azarderakhsh, Sheikh Mahbub Habib, Johannes A. Buchmann Abstract In distributed storage systems, documents are shared among multiple...

Details
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

02May

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Title Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials Authors Georg Fuchsbauer, Christian Hanser, Daniel Slamanig Abstract Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow joint...

Details
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

19Apr

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Title Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures Authors Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin and Daniel Slamanig Abstract Sanitizable signatures are a variant of digital signatures where a designated...

Details
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality

23Feb

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality

Title LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality Authors Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs (TU Darmstadt, Germany) Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda (NICT, Japan) Abstract The amount of digital...

Details
Securing the Internet of Things - Security and Privacy in a Hyperconnected World

22Feb

Securing the Internet of Things - Security and Privacy in a Hyperconnected World

Book Title Building the Hyperconnected Society IoT Research and Innovation Value Chains, Ecosystems and Markets Chapter Title Securing the Internet of Things - Security and Privacy in a Hyperconnected World Authors Elias Z. Tragos (FORTH, Greece), Henrich C. Pöhls...

Details
Homomorphic Signature Schemes - A Survey

21Feb

Homomorphic Signature Schemes - A Survey

Book Title Homomorphic Signature Schemes - A Survey Authors Giulia Traverso, Denise Demirel, Johannes Buchmann (Technische Universität Darmstadt) Preface In the last years, there has been an increasing interest in homomorphic signature schemes. Thus, many schemes have been proposed that...

Details
Efficient Proactive Secret Sharing

08Feb

Efficient Proactive Secret Sharing

Authors Jacqueline Brendel (Technische Universität Darmstadt), Denise Demirel (Technische Universität Darmstadt) Abstract Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on...

Details
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

16Jan

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authenticate their data under their own keys, and a proxy can transform these...

Details
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks

11Jan

Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks

Title Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks Authors Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer (IAIK, Graz University of Technology). Abstract Group signatures represent an important mechanism for privacy-preserving applications. However, their practical applicability...

Details
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations

10Jan

An Unconditionally Hiding Auditing Procedure for Multi-Party Computations

Authors Lucas Schabhüser (TU Darmstadt), Denise Demirel (TU Darmstadt), Johannes Buchmann (TU Darmstadt) Abstract  In this work an unconditionally hiding auditing procedure for computations on documents stored in distributed fashion is introduced. There is only one multi-party computation (MPC)...

Details

Element

Become a Member


Continue