08Sep
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly parameterizable. In our...
Details02Aug
MoPS: A Modular Protection Scheme for Long-Term Storage
Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes...
Details02Aug
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability
In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called LEPCoV , is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed...
Details02Aug
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures
Sanitizable signature schemes (SSS), as well as redactable signature schemes (RSS), gained a lot of attention in the recent past. In a nutshell, both types of signature schemes allow to alter signed data in a controlled way by a,...
Details02Aug
The Archistar Secret-Sharing Backup Proxy
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost-and energy-eecient, cloud storage's availability and data conndentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration...
Details13Jul
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shares of the documents are allocated according to the trustworthiness of the storage servers....
Details02May
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials
Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures. Messages are projective equivalence classes defined on group element vectors, so multiplying a...
Details19Apr
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message. At PKC’17, Camenisch et al. introduced the notion of invisible sanitizable signatures, which allow one to hide...
Details09Mar
Privately and Publicly Verifiable Computing Techniques: A Survey
This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing. This survey provides a good overview of the literature and helps people to understand this...
Details09Mar
Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo
Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for...
Details