PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Efficient Proactive Secret Sharing

08Feb

Efficient Proactive Secret Sharing

Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the...

Details
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

16Jan

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

We introduce the notion of homomorphic proxy re-authenticators, a tool that adds security and verifiability guarantees to multi-user data aggregation scenarios. It allows distinct sources to authenticate their data under their own keys, and a proxy can transform these...

Details
Linking-Based Revocation for Group Signatures : A Pragmatic Approach for Efficient Revocation Checks

11Jan

Linking-Based Revocation for Group Signatures : A Pragmatic Approach for Efficient Revocation Checks

Group signatures represent an important mechanism for privacy-preserving applications. However, their practical applicability is restricted due to inefficiencies of existing membership revocation mechanisms that place a computational burden and communication overhead on signers and verifiers. In particular, it seems...

Details
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations

10Jan

An Unconditionally Hiding Auditing Procedure for Multi-Party Computations

In this work an unconditionally hiding auditing procedure for computations on documents stored in distributed fashion is introduced. There is only one multi-party computation (MPC) scheme providing auditability which computationally protects the inputs of the computations. Building on this,...

Details
Malicious Clients in Distributed Secret Sharing Based Storage Networks

10Jan

Malicious Clients in Distributed Secret Sharing Based Storage Networks

Recent publications combine secret-sharing with byzantine fault-tolerant distribution schemes into safe and secure storage systems. To our knowledge current publications describe chosen algorithms and implementations but do not highlight areas of conflict between secret-sharing and BFT algorithms in a...

Details
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

10Jan

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016). Hanoi, Vietnam, December...

Details
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

09Jan

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, and Daniel Slamanig. "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures". In: PKC 2017, LNCS, Springer. (to appear)

Details
Batch-verifiable secret sharing with unconditional privacy

09Jan

Batch-verifiable secret sharing with unconditional privacy

We propose the first batch-verifiable secret sharing scheme with a significant security property, namely that of unconditional privacy. Verifiability and privacy of secret-shared messages are a crucial feature, e.g., in distributed computing scenarios, and verifiable secret sharing schemes with unconditional...

Details
A security analysis of techniques for long-term integrity protection

11Dec

A security analysis of techniques for long-term integrity protection

The amount of security critical information that is only available in digital form is increasing constantly. Some of these data, such as medical or tax data, need to be preserved for long periods of time. Thus, several schemes for...

Details
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems

11Dec

AS³: Adaptive Social Secret Sharing for Distributed Storage Systems

Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the...

Details

Element

Become a Member


Continue