PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Protean Signature Schemes

08Apr

Protean Signature Schemes

Title Protean Signature Schemes Authors Stephan Krenn (AIT), Henrich C. Pöhls (UNI PASSAU), Kai Samelin (IBM Research Zurich), Daniel Slamanig (AIT) Abstract tba Venue Cryptology and Network Security - CANS 2018  (http://cans2018.na.icar.cnr.it/) Place and Date Naples, Italy, Sep 30...

Details
Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients

08Jan

Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients

Title Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients Authors Alaqra AS, Fischer-Hübner S, Framner E Abstract Background: Patients’ privacy is regarded as essential for...

Details
A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks

27Jul

A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks

Title A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks Authors David Derler Abstract New computing paradigms such as cloud computing attracted significant attention in recent years and meanwhile numerous enterprises outsource data, computations or services...

Details
HCI Patterns for Cryptographically Equipped Cloud Services

27Jul

HCI Patterns for Cryptographically Equipped Cloud Services

Title HCI Patterns for Cryptographically Equipped Cloud Services Authors Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer Abstract tba Venue 20th International Conference on Human-Computer Interaction (http://2018.hci.international/) Place and Date  Las Vegas, Nevada, USA....

Details
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case

27Jul

CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case

Title CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Authors Lucas Schabhüser, Denis Butin, Johannes Buchmann Abstract Sensitive data is often outsourced to cloud servers, with the server performing computation on the data. Computational correctness must be efficiently...

Details
Function-Dependent Commitments for Verifiable Multi-Party Computation

27Jul

Function-Dependent Commitments for Verifiable Multi-Party Computation

Title Function-Dependent Commitments for Verifiable Multi-Party Computation Authors Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann Abstract In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. Existing solutions do not simultaneously...

Details
Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

26Jul

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

Title Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures Subtitle  Maintaining a legally sufficient integrity protection while achieving personal data protection by means of authorized subsequent modifications. Authors Henrich C. Pöhls (UNI PASSAU) Abstract [en] This thesis...

Details
The Wicket Problem of Privacy - Design Challenges for crypto-based solutions

24Jul

The Wicket Problem of Privacy - Design Challenges for crypto-based solutions

Title The Wicket Problem of Privacy - Design Challenges for crypto-based solutions Authors Alaqra, Ala Sarah Abstract Data privacy has been growing in importance in recent years, especially with the continuous increase of online activity. Researchers study, design, and...

Details
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

21Jun

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

Title CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle Authors Thomas Lorünser (AIT), Thomas Länger (UNIL), Henrich Poehls and Leon Sell (PASSAU) Abstract Application development for the cloud is already challenging because of the complexity caused by the...

Details
Rasta: A cipher with low ANDdepth and few ANDs per bit

15May

Rasta: A cipher with low ANDdepth and few ANDs per bit

Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of symmetric cryptographic schemes that minimize multiplications in one way or another. In this paper, we propose with Rasta a design strategy...

Details

Element

Become a Member


Continue