PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

08Sep

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly parameterizable. In our...

Details
MoPS: A Modular Protection Scheme for Long-Term Storage

02Aug

MoPS: A Modular Protection Scheme for Long-Term Storage

Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes...

Details
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

02Aug

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, called  LEPCoV , is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed...

Details
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

02Aug

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

Sanitizable signature schemes (SSS), as well as redactable signature schemes (RSS), gained a lot of attention in the recent past. In a nutshell, both types of signature schemes allow to alter signed data in a controlled way by a,...

Details
The Archistar Secret-Sharing Backup Proxy

02Aug

The Archistar Secret-Sharing Backup Proxy

Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost-and energy-eecient, cloud storage's availability and data conndentiality can be problematic. A common approach of mitigating those issues are cloud-of-cloud solutions. Another challenge is the integration...

Details
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

13Jul

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shares of the documents are allocated according to the trustworthiness of the storage servers....

Details
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

02May

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials

Structure-preserving signatures (SPS) are a powerful building block for cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow joint randomization of messages and signatures. Messages are projective equivalence classes defined on group element vectors, so multiplying a...

Details
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

19Apr

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message. At PKC’17, Camenisch et al. introduced the notion of invisible sanitizable signatures, which allow one to hide...

Details
Privately and Publicly Verifiable Computing Techniques: A Survey

09Mar

Privately and Publicly Verifiable Computing Techniques: A Survey

This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing. This survey provides a good overview of the literature and helps people to understand this...

Details
Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo

09Mar

Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo

Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for...

Details

Element

Become a Member


Continue