PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality

23Feb

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality

Title LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality Authors Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs (TU Darmstadt, Germany) Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda (NICT, Japan) Abstract The amount of digital...

Details
Homomorphic Signature Schemes - A Survey

21Feb

Homomorphic Signature Schemes - A Survey

Book Title Homomorphic Signature Schemes - A Survey Authors Giulia Traverso, Denise Demirel, Johannes Buchmann (Technische Universität Darmstadt) Preface In the last years, there has been an increasing interest in homomorphic signature schemes. Thus, many schemes have been proposed that...

Details
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

16Jan

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authenticate their data under their own keys, and a proxy can transform these...

Details
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks

11Jan

Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks

Title Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks Authors Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer (IAIK, Graz University of Technology). Abstract Group signatures represent an important mechanism for privacy-preserving applications. However, their practical applicability...

Details
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data

10Jan

An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data

Authors Lucas Schabhüser (TU Darmstadt), Denise Demirel (TU Darmstadt), Johannes Buchmann (TU Darmstadt) Abstract  In this work an unconditionally hiding auditing procedure for computations on documents stored in distributed fashion is introduced. There is only one multi-party computation (MPC)...

Details
PBFT and Secret-Sharing in Storage Settings

10Jan

PBFT and Secret-Sharing in Storage Settings

Title PBFT and Secret-Sharing in Storage Settings Authors Andreas Happe, Thomas Loruenser, Stephan Krenn (AIT Austrian Institute of Technology) Abstract Recent publications combine secret-sharing with byzantine fault-tolerant distribution schemes into safe and secure storage systems. To our knowledge current...

Details
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

10Jan

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016). Hanoi, Vietnam, December...

Details
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

09Jan

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, and Daniel Slamanig. "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures". In: PKC 2017, LNCS, Springer. (to appear)

Details
Batch-verifiable secret sharing with unconditional privacy

09Jan

Batch-verifiable secret sharing with unconditional privacy

We propose the first batch-verifiable secret sharing scheme with a significant security property, namely that of unconditional privacy. Verifiability and privacy of secret-shared messages are a crucial feature, e.g., in distributed computing scenarios, and verifiable secret sharing schemes with unconditional...

Details
2nd PRISMACLOUD Newsletter - November 2016

09Jan

2nd PRISMACLOUD Newsletter - November 2016

This is the second issue of the PRISMACLOUD newsletter that will keep you updated about our scientific progress and achievements, about recent events arranged and venues where we were present. In particular, this second issue contains a short description...

Details

Element

Become a Member


Continue