
08Apr
Protean Signature Schemes
Title Protean Signature Schemes Authors Stephan Krenn (AIT), Henrich C. Pöhls (UNI PASSAU), Kai Samelin (IBM Research Zurich), Daniel Slamanig (AIT) Abstract tba Venue Cryptology and Network Security - CANS 2018 (http://cans2018.na.icar.cnr.it/) Place and Date Naples, Italy, Sep 30...
Details
08Jan
Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients
Title Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients Authors Alaqra AS, Fischer-Hübner S, Framner E Abstract Background: Patients’ privacy is regarded as essential for...
Details
27Jul
A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks
Title A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks Authors David Derler Abstract New computing paradigms such as cloud computing attracted significant attention in recent years and meanwhile numerous enterprises outsource data, computations or services...
Details
27Jul
HCI Patterns for Cryptographically Equipped Cloud Services
Title HCI Patterns for Cryptographically Equipped Cloud Services Authors Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer Abstract tba Venue 20th International Conference on Human-Computer Interaction (http://2018.hci.international/) Place and Date Las Vegas, Nevada, USA....
Details
27Jul
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Title CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Authors Lucas Schabhüser, Denis Butin, Johannes Buchmann Abstract Sensitive data is often outsourced to cloud servers, with the server performing computation on the data. Computational correctness must be efficiently...
Details
27Jul
Function-Dependent Commitments for Verifiable Multi-Party Computation
Title Function-Dependent Commitments for Verifiable Multi-Party Computation Authors Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann Abstract In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. Existing solutions do not simultaneously...
Details
26Jul
Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures
Title Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures Subtitle Maintaining a legally sufficient integrity protection while achieving personal data protection by means of authorized subsequent modifications. Authors Henrich C. Pöhls (UNI PASSAU) Abstract [en] This thesis...
Details
24Jul
The Wicket Problem of Privacy - Design Challenges for crypto-based solutions
Title The Wicket Problem of Privacy - Design Challenges for crypto-based solutions Authors Alaqra, Ala Sarah Abstract Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and...
Details
21Jun
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Title CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle Authors Thomas Lorünser (AIT), Thomas Länger (UNIL), Henrich Poehls and Leon Sell (PASSAU) Abstract Application development for the cloud is already challenging because of the complexity caused by the...
Details
15May
Rasta: A cipher with low ANDdepth and few ANDs per bit
Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize multiplications in one way or another. In this paper, we propose with Rasta a design strategy...
Details