PRISMACLOUD

Blog Standard

D7.9 Second release of software modules for use case integration and validation

This report provides the final overview of the work done in the frame of task T7.4 - Software development of framework and components to realize use cases. This is the third report of the task, an iteration over deliverable...

Details

D5.11 Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users. The purpose of this deliverable is to extend the architecture...

Details

Einsetzbare Kryptografie für die Cloud

Title Einsetzbare Kryptografie für die Cloud Authors Henrich C. Pöhls (University of Passau) and Thomas Länger (University of Laussane) Abstract tba Journal  Zeitschrift für Datenrecht und informationssicherheit (digma). Jahrgang 17, Heft 1, März 2017 [Download]

Details

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

A chameleon-hash behaves likes a standard collision-resistant hash function for outsiders. If, however, a trapdoor is known, arbitrary collisions can be found. Chameleon-hashes with ephemeral trapdoors (CHET; Camenisch et al., PKC 17) allow prohibiting that the holder of the...

Details

Performing Computations on Hierarchically Shared Secrets

Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and...

Details

Element

Become a Member


Continue