02May
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures. Messages are projective equivalence classes defined on group element vectors, so multiplying a...
Details19Apr
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message. At PKC’17, Camenisch et al. introduced the notion of invisible sanitizable signatures, which allow one to hide...
Details09Mar
Privately and Publicly Verifiable Computing Techniques: A Survey
This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing. This survey provides a good overview of the literature and helps people to understand this...
Details09Mar
Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo
Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for...
Details09Mar
Unikernel for Cloud Services: How Single-Responsibility can Reduce Complexity
Unikernels allow application deployment through custom-built minimal virtual machines. The authors investigate how unikernels and their inherent minimalism benefit system security. The analysis starts with common security vulnerability classes and their possible remediation. A platonic unikernel framework is used...
Details09Mar
Exchanging Database Writes with Modern Cryptography
Modern cryptography provides for new ways of solving old problems. This paper details how Keyed-Hash Message Authentication Codes (HMACs) or Authenticated Encryption with Associated Data (AEAD) can be employed as an alternative to a traditional server-side temporal session store....
Details06Mar
Secure and Privacy-Friendly Storage and Data Processing in the Cloud
At the IFIP Summer School 2017, the two H2020 projects CREDENTIAL and PRISMACLOUD co-organized a workshop dedicated to introducing the necessary background knowledge and demonstrating prototypes of privacy-preserving solutions for storing, sharing, and processing potentially sensitive data in untrusted...
Details23Feb
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality
The amount of digital data that requires long-term protection of integrity, authenticity, and confidentiality grows rapidly. Examples include electronic health records, genome data, and tax data. In this paper we present the secure storage system LINCOS, which provides protection...
Details22Feb
Securing the Internet of Things - Security and Privacy in a Hyperconnected World
Book Title Building the Hyperconnected Society IoT Research and Innovation Value Chains, Ecosystems and Markets Chapter Title Securing the Internet of Things - Security and Privacy in a Hyperconnected World Authors Elias Z. Tragos (FORTH, Greece), Henrich C. Pöhls...
Details21Feb
Homomorphic Signature Schemes - A Survey
In the last years, there has been an increasing interest in homomorphic signature schemes. Thus, many schemes have been proposed that are suitable for a lot of different applications. In this work, we overcome the extensive state of the...
Details