PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Providing secure mechanisms to protect personal data in a mobility platform

15May

Providing secure mechanisms to protect personal data in a mobility platform

Security and privacy preserving methods need to be developed to facilitate cloud usage even for organisations dealing with sensitive information and maintaining security critical services. A reasonable way to achieve the required security properties for outsourced data storage and...

Details
A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications

05Apr

A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications

Title A Fast and Resource Efficient FPGA Implementation of Secret Sharing for Storage Applications Authors Jakob Stangl (TU Wien) , Thomas Lorünser (AIT Austrian Institute of Technology), Sai Dinakarrao (TU Wien) Abstract Outsourcing data into the cloud gives wide benefits...

Details
Highly-Efficient Fully-Anonymous Dynamic Group Signatures

05Apr

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Group signatures are a central tool in privacy-enhancing cryptography, which allow members of a group to anonymously produce signatures on behalf of the group. Consequently, they are an attractive means to implement privacy-friendly authentication mechanisms. Ideally, group signatures are...

Details
Einsetzbare Kryptografie für die Cloud

09Mar

Einsetzbare Kryptografie für die Cloud

Title Einsetzbare Kryptografie für die Cloud Authors Henrich C. Pöhls (University of Passau) and Thomas Länger (University of Laussane) Abstract tba Journal  Zeitschrift für Datenrecht und informationssicherheit (digma). Jahrgang 17, Heft 1, März 2017 [Download]

Details
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

05Mar

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoors (CHET; Camenisch et al., PKC 17) allow prohibiting that the holder of the...

Details
Performing Computations on Hierarchically Shared Secrets

05Mar

Performing Computations on Hierarchically Shared Secrets

Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and...

Details
UniGuard: Protecting Unikernels using Intel SGX

16Jan

UniGuard: Protecting Unikernels using Intel SGX

Computations executed in lightweight virtual machines called unikernels have a minimal attack surface and improved performance. However, unikernels are still prone to leaking information to the operating system or to the hypervisor that hosts them. This is attributed to...

Details
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

16Jan

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographically protected payload...

Details
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

16Jan

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

In this paper we address the construction of privacy-friendly cryptographic primitives for the post-quantum era and in particular accumulators with zero-knowledge membership proofs and ring signatures. This is an important topic as it helps to protect the privacy of users...

Details
A Linearly Homomorphic Signature Scheme from Weaker Assumptions

08Jan

A Linearly Homomorphic Signature Scheme from Weaker Assumptions

In delegated computing, prominent in the context of cloud computing, guaranteeing both the correctness and authenticity of computations is of critical importance. Homomorphic signatures can be used as cryptographic solutions to this problem. In this paper we solve the...

Details

Element

Become a Member


Continue