Risultati finali Documents, reports (25) Applying Mix Nets to Email Document This report will present the use-case and requirements, based on empirical data, of the mix networking infrastructure, with a focus on usability, a mathematical analysis of the privacy set, and threat models. Complete Exploitation Plan We will update D2.5 with exploitation activities already performed including definition of business models for market adoption of results of the project. Minimum Viable Product (MVP) A functional, deployable, and demonstrable mix-net service implemented according to results and requirements from WP3, WP5, WP6 and WP7. Report on Exploitation Activities and Updated Plan for Further Exploitation Final update of the exploitation plan will be presented and a list of exploitation activities performed during the last year of the project will be reported. Requirements and User Interface Design Documents including a first version of the evotingsystem Initial report Modelling and Design elements. Describes some of the existing shuffle protocols (WP3.2), initial design options for mix-nets (WP3.1) and definitions of privacy (WP3.3) Dissemination Report I Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary. Survey/Statistics: Interim report Interim report including requirements analysis and initial design. This report will describe the results of the requirements analysis and outline the initial design used to start the implementation. Modelling, Design and Analysis:Interim report First iteration of a NIZK shuffle proof. Describes the shuffle protocol that may be used in implementation within WP5; Integrates robustness into efficient mix-net designs and decryption mixes; proposes robust definitions of mix-nets as differentially private mechanisms Final Review and Assessment This deliverable will review and assess the activities, results, and progresses of Y3. This will provide a basis for each consortium member to engage in further EU projects with increased performance and efficiency. Dissemination Plan A dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1. Final report validation & testing This report will summarize the results of the validation and testing including lessons learned. It will provide guidance to future adopters of the system. Integrated System A fully integrated, tested, and documented system, incorporating any updated requirements and designs from the experience of the MVP that can be disseminated. Y1 Review and Assessment This deliverable will review and assess the activities, results, and progresses of Y1. This will provide a basis for moving into Y2 and examine where the consortium was successful and where improvements are needed for the following year. Final report Final iteration of the NIZK shuffle proof together with security analysis, and an implementation; validation of mix-net design options and refinement of definitions to suit other WPs Standardisation Report The standardization-related efforts and achievements will be collected in this report. Y2 Review and Assessment This deliverable will review and assess the activities, results, and progresses of Y2. This will provide a basis for moving into Y3 and examine where the consortium was successful and where improvements are needed for the following year. Ethics report The ethics report details all procedures that will be implemented for data collection, storage, protection, retention and destruction and confirmation of personal information by Panoramix partners. Copies of ethical approvals by the competent Ethics Committee and copies of approvals for the collection of personal data by the competent University Data Protection Officer / National Data Protection authority will be included, and in case of data not publicly available, relevant authorisations will also be provided if applicable. This deliverable will also contain templates of the informed consent form to be used. Scientific Advisory Board Reports After each EAB meeting EAB will write a report with observations, recommendations and conclusions on actions for increasing the project impact. A summary of all reports will be compiled at the end of the project. Dissemination Report II Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary. Dissemination Report III Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary. Preliminary Exploitation Plan In this deliverable the first version of exploitation plan will be presented. It will be aligned with the consortium partners’ business plans and market evaluation. Analysis of User Feedback Based on the user feedback from the deployment of mix networking with email, we will determine whether or not users found the privacy sufficient. This report will also include the feedback from the living lab research, where the mobile message app is tested with 1000 test users. Final System A production-ready system and a corresponding internet service incorporating any external feedback and addressing any remaining integration issues. Initial Requirements, Design, and Prototype The first version of the system that addresses basic concerns in all three tasks that do not depend on other work packages, requirements addressing the state-of-the-art industry environments, design addressing development methodology and tools, and prototype addressing development, deployment, and the testing environment. Other (3) Open-source code of integrated system for desktops This deliverable, available as code on GitHub with a brief developer guide to the code, will allow system administrators to deploy the mixnetworking infrastructure for email, with clients for desktop and mobile (Android). Integrated Service The integrated service implements the full feature set and incorporates adjustments after the experience with the MVP. Final Service The final version of the e-voting service, fully documented for developers and users, and proven in production conditions. Demonstrators, pilots, prototypes (1) Minimum Viable Product A viable demonstration of the designs and capabilities developed by Task 5.2, in a first integration with the mix-net service. Websites, patent fillings, videos etc. (1) Public Web Page and Blog A public webpage will be created and updated throughout the duration of the project. Pubblicazioni Conference proceedings (30) HORNET: High-speed Onion Routing at the Network Layer Autori: Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig Pubblicato in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 2015, Pagina/e 1441-1454 Editore: ACM Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles Autori: Prastudy Fauzi and Helger Lipmaa Pubblicato in: Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, 2016, Pagina/e 200-216 Editore: Springer International Publishing k-fingerprinting: a Robust Scalable Website Fingerprinting Technique Autori: Jamie Hayes and George Danezis Pubblicato in: 25th USENIX Security Symposium 2016, 2016, Pagina/e 1187--1203 Editore: USENIX Association When owl:sameAs isn't the Same Redux: Towards a Theory of Identity, Context, and Inference on the Semantic Web Autori: Harry Halpin, Patrick J. Hayes, and Henry S.Thompson Pubblicato in: Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015, 2015, Pagina/e 47-60 Editore: Springer International Publishing Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) Autori: Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu Pubblicato in: IEEE European Symposium on Security and Privacy, 2016, Pagina/e 276-291 Editore: IEEE Blockchain Mining Games Autori: Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis Pubblicato in: Proceedings of the 2016 ACM Conference on Economics and Computation, 2016, Pagina/e 365-382 Editore: ACM Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs Autori: Helger Lipmaa Pubblicato in: Progress in Cryptology - AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, 2016, Pagina/e 185-206 Editore: Springer International Publishing Efficient Private Statistics with Succinct Sketches Autori: Luca Melis, George Danezis and Emiliano De Cristofaro Pubblicato in: 23nd Annual Network and Distributed System Security Symposium, NDSS, 2016, 2016 Editore: The Internet Society AnNotify: A Private Notification Service Autori: Piotrowska, A. M.; Hayes, J.; Gelernter, N.; Danezis, G.; Herzberg, A. Pubblicato in: In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES '17). (pp. pp. 5-15). Association for Computing Machinery (ACM): New York, NY, USA. (2017), Numero 1, 2017 Editore: ACM Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces Autori: Mavroudis, Vasilios; Veale, Michael Pubblicato in: In: Proceedings of Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET: London, UK. (2018), Numero 1, 2018 Editore: IET DOI: 10.31228/OSF.IO/8QN9F POTs: Protective Optimization Technologies Autori: Overdorf, Rebekah; Kulynych, Bogdan; Balsa, Ero; Troncoso, Carmela; Gürses, Seda Pubblicato in: Numero 1, 2018 Editore: arXiv SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining Autori: Weggenmann, Benjamin; Kerschbaum, Florian Pubblicato in: Numero 1, 2018 Editore: ACM A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components Autori: Mavroudis, V.; Cerulli, A.; Svenda, P.; Cvrcek, D.; Klinec, D.; Danezis, G. Pubblicato in: In: Evans, D and Malkin, T and Xu, D, (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1583-1600). ACM: New York, USA. (2017), Numero 1, 2017 Editore: ACM Mix-ORAM: Using Delegated Shuffles Autori: Toledo, R. R.; Danezis, G. D.; Echizen, I. E. Pubblicato in: In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society. (pp. pp. 51-61). ACM: New York, USA. (2017), Numero 1, 2017 Editore: ACM A Shuffle Argument Secure in the Generic Model Autori: Prastudy Fauzi, Helger Lipmaa and Michał Zając. Pubblicato in: Advances in Cryptology - ASIACRYPT 2016, 2016 Editore: Springer International Publishing Centrally Banked Cryptocurrencies Autori: George Danezis, Sarah Meiklejohn Pubblicato in: Proceedings 2016 Network and Distributed System Security Symposium, 2016, ISBN 1-891562-41-X Editore: Internet Society DOI: 10.14722/ndss.2016.23187 Toward an Efficient Website Fingerprinting Defense Autori: Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright Pubblicato in: Computer Security – ESORICS 2016, 2016, Pagina/e 27-46 Editore: Springer International Publishing DOI: 10.1007/978-3-319-45744-4_2 Efficient Encrypted Keyword Search for Multi-user Data Sharing Autori: Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang Pubblicato in: Computer Security – ESORICS 2016, 2016, Pagina/e 173-195 Editore: Springer International Publishing DOI: 10.1007/978-3-319-45744-4_9 SFADiff - Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning Autori: George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias Pubblicato in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Pagina/e 1690-1701, ISBN 9781-450341394 Editore: ACM Press DOI: 10.1145/2976749.2978383 Practical Non-Malleable Codes from l-more Extractable Hash Functions Autori: Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis Pubblicato in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Pagina/e 1317-1328, ISBN 9781-450341394 Editore: ACM Press DOI: 10.1145/2976749.2978352 Indistinguishable Proofs of Work or Knowledge Autori: Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Pubblicato in: Advances in Cryptology – ASIACRYPT 2016, 2016, Pagina/e 902-933 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53890-6_30 CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions Autori: Fabrice Benhamouda, Florian Bourse, Helger Lipmaa Pubblicato in: Public-Key Cryptography – PKC 2017, 2017, Pagina/e 36-66 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-54388-7_2 Ceremonies for End-to-End Verifiable Elections Autori: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Pubblicato in: Public-Key Cryptography – PKC 2017, 2017, Pagina/e 305-334 Editore: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-54388-7_11 Optimally Sound Sigma Protocols Under DCRA Autori: Helger Lipmaa Pubblicato in: 21st International Conference on Financial Cryptography and Data Security 2017, 2017 Editore: IACR A Simpler Rate-Optimal CPIR Protocol. Autori: Helger Lipmaa and Kateryna Pavly Pubblicato in: 21st International Conference on Financial Cryptography and Data Security 2017, 2017 Editore: IACR Privacy-Preserving Outlier Detection for Data Streams Autori: Jonas Böhler, Daniel Bernau, Florian Kerschbaum Pubblicato in: Data and Applications Security and Privacy XXXI. DBSec 2017, 2017, Pagina/e 225-238 Editore: Springer International Publishing DOI: 10.1007/978-3-319-61176-1_12 The Loopix Anonymity System Autori: Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis Pubblicato in: USENIX Security Symposium 2017, 2017 Editore: USENIX Association MCMix: Anonymous Messaging via Secure Multiparty Computation Autori: Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias Pubblicato in: USENIX Security Symposium 201, 2017 Editore: USENIX Association Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. Autori: Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov Pubblicato in: Advances in Cryptology – CRYPTO 2017, 2017, Pagina/e 357-388 Editore: Springer International Publishing DOI: 10.1007/978-3-319-63688-7_12 The Bitcoin Backbone Protocol with Chains of Variable Difficulty Autori: Juan Garay, Aggelos Kiayias, Nikos Leonardos Pubblicato in: Advances in Cryptology – CRYPTO 2017, 2017, Pagina/e 291-323 Editore: Springer International Publishing DOI: 10.1007/978-3-319-63688-7_10 Peer reviewed articles (7) A Framework for the Game-theoretic Analysis of Censorship Resistance Autori: Tariq Elahi, Joan A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero volume 4, 2016, 2016, Pagina/e 83-101, ISSN 2299-0984 Editore: Walter De Gruyter GmbH SoK: Making Sense of Censorship Resistance Systems Autori: Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero Volume 4, 2016, 2016, Pagina/e 37-61, ISSN 2299-0984 Editore: De Gruyter Lower-Cost epsilon-Private Information Retrieval Autori: Raphael R. Toledo, George Danezis, Ian Goldberg Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero Volume 4, 2016, 2016, Pagina/e 184–201, ISSN 2299-0984 Editore: De Gruyter Website Fingerprinting Defenses at the Application Layer Autori: Giovanni Cherubin, Jamie Hayes, Marc Juarez Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero 2017/2, 2017, ISSN 2299-0984 Editore: De Gruyter Open DOI: 10.1515/popets-2017-0023 An Efficient E2E Verifiable E-voting System without Setup Assumptions Autori: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Pubblicato in: IEEE Security & Privacy, Numero 15/3, 2017, Pagina/e 14-23, ISSN 1540-7993 Editore: IEEE Computer Society DOI: 10.1109/MSP.2017.71 On the Privacy and Security of the Ultrasound Ecosystem Autori: Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero 2017/2, 2017, ISSN 2299-0984 Editore: De Gruyter Open DOI: 10.1515/popets-2017-0018 Auditing for privacy in threshold PKE e-voting Autori: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Pubblicato in: Information and Computer Security, Numero 25/1, 2017, Pagina/e 100-116, ISSN 2056-4961 Editore: Emerald Publishing Limited DOI: 10.1108/ics-07-2016-0056 Other (3) AWARE: Anonymization With guARanteEd privacy Autori: Florian Kerschbaum, Mathias Kohler, Florian Hahn and Daniel Bernau Pubblicato in: 2016 Editore: SAP Internal Product Security Research A survey on routing in anonymous communication protocols Autori: Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, and Claudia Diaz Pubblicato in: 2016 Editore: KU Leuven VAMS: Verifiable Auditing of Access to Confidential Data Autori: Hicks, Alexander; Mavroudis, Vasilios; Al-Bassam, Mustafa; Meiklejohn, Sarah; Murdoch, Steven J. Pubblicato in: Numero 1, 2018 Editore: arXiv Book chapters (2) Optimally Sound Sigma Protocols Under DCRA Autori: Helger Lipmaa Pubblicato in: Financial Cryptography and Data Security, Numero 10322, 2017, Pagina/e 182-203, ISBN 978-3-319-70971-0 Editore: Springer International Publishing DOI: 10.1007/978-3-319-70972-7_10 A Simpler Rate-Optimal CPIR Protocol Autori: Helger Lipmaa, Kateryna Pavlyk Pubblicato in: Financial Cryptography and Data Security, Numero 10322, 2017, Pagina/e 621-638, ISBN 978-3-319-70971-0 Editore: Springer International Publishing DOI: 10.1007/978-3-319-70972-7_35 Diritti di proprietà intellettuale Patent (2) Method and System for Automated Text Anonymization Numero candidatura/pubblicazione: US 15/881,958 Data: 2018-01-29 DIFFERENTIAL PRIVACY AND OUTLIER DETECTION WITHIN A NONINTERACTIVE MODEL Numero candidatura/pubblicazione: EP 17001769 Data: 2017-10-26 È in corso la ricerca di dati su OpenAIRE... Si è verificato un errore durante la ricerca dei dati su OpenAIRE Nessun risultato disponibile