Deliverables Documents, reports (20) HCI Research Report Presentation of the project's HCI Research results including final HCI guidelines. Advanced architecture for distributed storage in dynamic environments Design of a storage layer with increased dynamicity and additional user privacy for intra-cloud deployment. Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing Report describing the usage and limitations of malleable sign. to build cryptographic checks that detect non-conformance of processing and allows to honour compliant processor by keeping the authenticity verifiable on the result of the processing. Improved guidelines and architecture for secure service composition Improved and revised final version of report. Security and privacy by design guidelines for PRISMACLOUD Security and privacy by design guidelines for PRISMACLOUD Dissemination and exploitation report 1 Summary of diss. and exploitation activities for the reporting period. User advisory board communication summary 1 Summary of UAB establishment, first interactions, workshops. User advisory board communication summary 2 Summary of communication activities and feedback from UAB. Domain independent generic security models Presents a security model indepenent for domain specific use cases. Secure cloud usage for end user Final report- in form of a handbook or book. Risk and threat analysis with security requirements Summarizes the threat and risk analysis as well as derived security requirements. Final report on privacy and anonymisation techniques Final report on privacy and anonymisation techn. Analysis of the State of the Art of FPE, OPE and Tokenization schemes A review of current solutions for FPE, OPE and Tokenization schemes. Report on Privacy-enhancing cryptography Final report on the advancements of privacy-enhancing cryptography. Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions Proposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3. Overview of functional and malleable signature schemes Overview of state of the art malleable and functional signature schemes and their properties, such as, efficiency, privacy, and unforgeability. Legal, social and HCI requirements Presents and discusses the requirements that are elicited by task 1.1. Overview of verifiable computing techniques providing private and public verification Overview of state of the art privately and publicly verifiable computing techniques and an analysis of their properties, e.g., privacy, efficiency, and applicability. Holistic security model for secure service composition Holistic security model for secure service composition Publicly verifiable computing techniques providing long-term privacy Proposal for a publicly verifiable computing technique that provides long-term privacy. Publications Other (2) Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0 Author(s): Gallego-Nicasio Crespo, Beatriz; Prieto, Elsa; Rios, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas Published in: Fraunhofer FOKUS, Issue 8, 2016 Publisher: DPSP Cluster DOI: 10.13140/RG.2.2.22406.37444 Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market Author(s): Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao Published in: 2016 Publisher: DPSP Cluster Conference proceedings (57) Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives Author(s): Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1825-1842, ISBN 9781-450349468 Publisher: ACM Press DOI: 10.1145/3133956.3133997 Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications Author(s): David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks Published in: 2018, Page(s) 219-250 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-76578-5_8 Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More Author(s): David Derler, Sebastian Ramacher, Daniel Slamanig Published in: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Page(s) 273-287, ISBN 978-1-5386-4228-3 Publisher: IEEE DOI: 10.1109/EuroSP.2018.00027 A Linearly Homomorphic Signature Scheme from Weaker Assumptions Author(s): Lucas Schabhüser, Johannes Buchmann, Patrick Struck Published in: 2017, Page(s) 261-279 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-71045-7_14 Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives Author(s): David Derler, Sebastian Ramacher, Daniel Slamanig Published in: 2018, Page(s) 419-440 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-79063-3_20 Performing Computations on Hierarchically Shared Secrets Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann Published in: 2018, Page(s) 141-161 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-89339-6_9 Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Published in: 2018, Page(s) 11-32 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-89339-6_2 CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Author(s): Lucas Schabhüser, Denis Butin, Johannes Buchmann Published in: 2018 Publisher: Springer LNCS Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange Author(s): David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks Published in: 2018, Page(s) 425-455 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-78372-7_14 UniGuard: Protecting Unikernels Using Intel SGX Author(s): Ioannis Sfyrakis, Thomas Gross Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 99-105, ISBN 978-1-5386-5008-0 Publisher: IEEE DOI: 10.1109/IC2E.2018.00032 Function-Dependent Commitments for Verifiable Multi-Party Computation Author(s): Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann Published in: 2018 Publisher: Springer Protean Signature Schemes Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Published in: 2018 Publisher: Springer Secure and Privacy-Friendly Storage and Data Processing in the Cloud Author(s): Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini Published in: 2017, Page(s) 153-169 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-92925-5_10 Highly-Efficient Fully-Anonymous Dynamic Group Signatures Author(s): David Derler, Daniel Slamanig Published in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Page(s) 551-565, ISBN 9781-450355766 Publisher: ACM Press DOI: 10.1145/3196494.3196507 A fast and resource efficient FPGA implementation of secret sharing for storage applications Author(s): Jakob Stangl, Thomas Lorunser, Sai Manoj Pudukotai Dinakarrao Published in: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Page(s) 654-659, ISBN 978-3-9819263-0-9 Publisher: IEEE DOI: 10.23919/DATE.2018.8342091 Rasta: A cipher with low ANDdepth and few ANDs per bit Author(s): Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger Published in: 2018, Page(s) 662-692 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-96884-1_22 CryptSDLC - Embedding Cryptographic Engineering into Secure Software Development Lifecycle Author(s): Thomas Loruenser, Henrich C. Pöhls, Leon Sell, Thomas Laenger Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-9, ISBN 9781-450364485 Publisher: ACM Press DOI: 10.1145/3230833.3233765 HCI Patterns for Cryptographically Equipped Cloud Services Author(s): Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer Published in: 2018, Page(s) 567-586 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-91238-7_44 Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System Author(s): Denise Demirel, Stephan Krenn, Thomas Lorunser, Giulia Traverso Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 88-97, ISBN 978-1-5090-0990-9 Publisher: IEEE DOI: 10.1109/ARES.2016.88 Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle Author(s): Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 428-436, ISBN 978-1-5090-0990-9 Publisher: IEEE DOI: 10.1109/ARES.2016.73 Dynamic and Verifiable Hierarchical Secret Sharing Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann Published in: 2016, Page(s) 24-43 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-49175-2_2 Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions Author(s): Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig Published in: 2016, Page(s) 391-408 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-44618-9_21 Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability Author(s): Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann Published in: 2017, Page(s) 142-160 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-55589-8_10 An unconditionally hiding auditing procedure for computations over distributed data Author(s): Lucas Schabhuser, Denise Demirel, Johannes Buchmann Published in: 2016 IEEE Conference on Communications and Network Security (CNS), 2016, Page(s) 552-560, ISBN 978-1-5090-3065-1 Publisher: IEEE DOI: 10.1109/CNS.2016.7860547 AS 3 : Adaptive social secret sharing for distributed storage systems Author(s): Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 528-535, ISBN 978-1-5090-4379-8 Publisher: IEEE DOI: 10.1109/PST.2016.7907011 Universal Composition with Responsive Environments Author(s): Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch Published in: 2016, Page(s) 807-840 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53890-6_27 LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality Author(s): Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 461-468, ISBN 9781-450349444 Publisher: ACM Press DOI: 10.1145/3052973.3053043 Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing Author(s): David Derler, Stephan Krenn, Daniel Slamanig Published in: 2016, Page(s) 211-227 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-48965-0_13 Cryptographically Enforced Four-Eyes Principle Author(s): Arne Bilzhause, Manuel Huber, Henrich C. Pohls, Kai Samelin Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 760-767, ISBN 978-1-5090-0990-9 Publisher: IEEE DOI: 10.1109/ARES.2016.28 Signatures for Trust and Accountability in the Cloud: A Technical and User Perspective Author(s): Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig Published in: 2016, Page(s) 79-96 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-41763-9_6 Malicious Clients in Distributed Secret Sharing Based Storage Networks Author(s): Andreas Happe, Stephan Krenn, Thomas Lorünser Published in: 2017, Page(s) 206-214 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-62033-6_23 Towards Authenticity and Privacy Preserving Accountable Workflows Author(s): David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig Published in: 2016, Page(s) 170-186 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-41763-9_12 Practical Signing-Right Revocation Author(s): Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin Published in: 2016, Page(s) 21-39 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-45572-3_2 Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT Author(s): Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin Published in: 2016, Page(s) 197-213 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-50011-9_16 Efficient proactive secret sharing Author(s): Jacqueline Brendel, Denise Demirel Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 543-550, ISBN 978-1-5090-4379-8 Publisher: IEEE DOI: 10.1109/PST.2016.7907013 Formal Policy-based Provenance Audit Author(s): Denis Butin, Denise Demirel, Johannes Buchmann Published in: 2016, Page(s) 234-253 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-44524-3_14 Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks (change title in the website) Author(s): Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer Published in: 2017, Page(s) 364-388 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-61273-7_18 MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Author(s): Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen Published in: 2016, Page(s) 191-219 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-53887-6_7 Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures Author(s): Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Published in: 2017, Page(s) 152-182 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-54388-7_6 Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds Author(s): Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti Published in: 2016, Page(s) 115-132 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-44760-5_8 Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures Author(s): Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Published in: 2017, Page(s) 437-452 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-60055-0_23 A security analysis of techniques for long-term integrity protection Author(s): Matthias Geihs, Denise Demirel, Johannes Buchmann Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 449-456, ISBN 978-1-5090-4379-8 Publisher: IEEE DOI: 10.1109/PST.2016.7906995 Accountable Redactable Signatures Author(s): Henrich C. Pohls, Kai Samelin Published in: 2015 10th International Conference on Availability, Reliability and Security, 2015, Page(s) 60-69, ISBN 978-1-4673-6590-1 Publisher: IEEE DOI: 10.1109/ARES.2015.10 ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing Author(s): Thomas Loruenser, Andreas Happe, Daniel Slamanig Published in: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, Page(s) 371-378, ISBN 978-1-4673-9560-1 Publisher: IEEE DOI: 10.1109/CloudCom.2015.71 Proactive Security Analysis of Changes in Virtualized Infrastructures Author(s): Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim Published in: Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Page(s) 51-60, ISBN 9781-450336826 Publisher: ACM Press DOI: 10.1145/2818000.2818034 The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014 Author(s): F.W.J. van Geelkerken and H. C. Pöhls and S. Fischer-Hübner Published in: "Proceedings of the 3rd International Academic Conference of Young Scientists ""Law & Psychology 2015"" (LPS-2015)", Issue 5th Edition, yearly, November 26–28, 2015, 2015, Page(s) 404-410, ISBN 978-617-607-856-2 Publisher: Lviv polytechn. publ. house MoPS - A Modular Protection Scheme for Long-Term Storage Author(s): Christian Weinert, Denise Demirel, Martín Vigil, Matthias Geihs, Johannes Buchmann Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 436-448, ISBN 9781-450349444 Publisher: ACM Press DOI: 10.1145/3052973.3053025 Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security Author(s): Andreas Happe, Bob Duncan, Alfred Bratterud Published in: Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk, 2017, Page(s) 30-41, ISBN 978-989-758-244-8 Publisher: SCITEPRESS - Science and Technology Publications DOI: 10.5220/0006282800300041 Enterprise IoT security and scalability - how unikernels can improve the status Quo Author(s): Bob Duncan, Andreas Happe, Alfred Bratterud Published in: Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16, 2016, Page(s) 292-297, ISBN 9781-450346160 Publisher: ACM Press DOI: 10.1145/2996890.3007875 Exchanging Database Wirtes with Modern Cryptography Author(s): Andreas Happe, Thomas Loruneser Published in: 2016 Publisher: IARIA The Archistar Secret-Sharing Backup Proxy Author(s): Andreas Happe, Florian Wohner and Thomas Loruenser Published in: 2017 Publisher: ACM Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures Author(s): Arne Bilzhause, Henrich C. Pöhls and Kai Samelin Published in: 2017 Publisher: ACM Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems Author(s): Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Denise Demirel, Reza Azarderakhsh, Sheikh Mahbub Habib, Johannes A.Buchmann Published in: 2017 Publisher: IEEE Batch-verifiable Secret Sharing with Unconditional Privacy Author(s): Stephan Krenn, Thomas Lorünser, Christoph Striecks Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 303-311, ISBN 978-989-758-209-7 Publisher: SCITEPRESS - Science and Technology Publications DOI: 10.5220/0006133003030311 Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation Author(s): David Derler, Sebastian Ramacher, Daniel Slamanig Published in: 2017 Publisher: Springer LoT: a Reputation-based Trust System for Long-term Archiving Author(s): Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, Max Mühlhäuser Published in: 2016 Publisher: IARIA Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario Author(s): A. Alaqra, S. Fischer- Hübner, J.S. Pettersson and E. Wästlund Published in: 2016 Publisher: Plymouth University Non-peer reviewed articles (2) TRUSTEE – Data Privacy and Cloud Security Cluster Europe Author(s): Justina Bieliauskaite, Agi Karyda, Stephan Krenn, Erkuden Rios, George Suciu Jr Published in: ERCIM News, Issue No. 114, 2018, Page(s) 37, ISSN 0926-4981 Publisher: ERCIM EEIG PRISMACLoUD – Privacy and Security Maintaining Services in the Cloud Author(s): Daniel Slamanig, Agi Karyda, Thomas Lorünser Published in: ERCIM News, Issue Number 104, 2016, Page(s) 46, ISSN 0926-4981 Publisher: ERCIM EEIG Peer reviewed articles (7) Secure and Robust Multi-Cloud Storage for Public Sector Author(s): Thomas Lorünser, Eva Munoz, Marco Decandia Brocca Published in: ERCIM News, 2018, ISSN 0926-4981 Publisher: ERCIM EEIG Engineering Cryptography for Security and Privacy in the Cloud Author(s): Stephan Krenn, Thomas Lorünser and Christoph Striecks Published in: ERCIM News, Issue No. 113, 2018, ISSN 0926-4981 Publisher: ERCIM EEIG Practical witness encryption for algebraic languages or how to encrypt under Groth–Sahai proofs Author(s): David Derler, Daniel Slamanig Published in: Designs, Codes and Cryptography, 2018, ISSN 0925-1022 Publisher: Kluwer Academic Publishers DOI: 10.1007/s10623-018-0460-y Einsetzbare Kryptografie für die Cloud Author(s): Henrich C. Pöhls, Thomas Länger Published in: Zeitschrift für Datenrecht und informationssicherheit, 2017, ISSN 1424-9944 Publisher: Digma A New Architecture for Developing Cryptographic Cloud Services Author(s): Thomas Lorünser (AIT Austrian Institute of Technology GmbH), Daniel Slamanig (TU Graz), Thomas Länger (University of Lausanne) and Henrich C. Pöhls (Universiy of Passau) Published in: ERCIM News, Issue No. 106 July 2016, 2016, ISSN 0926-4981 Publisher: ERCIM EEIG Agile cryptographic solutions for the cloud Author(s): Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger Published in: e & i Elektrotechnik und Informationstechnik, 2017, ISSN 0932-383X Publisher: Springer Verlag DOI: 10.1007/s00502-017-0519-x Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. Author(s): Georg Fuchsbauer, Christian Hanser, Daniel Slamanig Published in: Journal of Cryptology, 2017, ISSN 0933-2790 Publisher: Springer Verlag Thesis dissertations (3) A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions, and Novel Building Blocks Author(s): David Derler Published in: 2018 Publisher: Technischen Universitat Graz Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures Author(s): Henrich C. Pöhls Published in: 2018 Publisher: University of Passau The Wicket Problem of Privacy - Design Challenges for crypto-based solutions Author(s): Ala Alaqra Published in: 2018 Publisher: Karlstads Universitet Book chapters (12) Verifiably Encrypted Signatures: Security Revisited and a New Construction Author(s): Christian Hanser, Max Rabkin, Dominique Schröder Published in: Computer Security -- ESORICS 2015, 2015, Page(s) 146-164, ISBN 978-3-319-24174-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-24174-6_8 Stronger Security for Sanitizable Signatures Author(s): Stephan Krenn, Kai Samelin, Dieter Sommer Published in: Data Privacy Management, and Security Assurance, 2016, Page(s) 100-117, ISBN 978-3-319-29883-2 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-29883-2_7 Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes Author(s): David Derler, Daniel Slamanig Published in: Provable Security, 2015, Page(s) 455-474, ISBN 978-3-319-26059-4 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-26059-4_25 Privacy-Aware Authentication in the Internet of Things Author(s): Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer Published in: Cryptology and Network Security, 2015, Page(s) 32-39, ISBN 978-3-319-26823-1 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-26823-1_3 A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials Author(s): David Derler, Christian Hanser, Daniel Slamanig Published in: Cryptography and Coding, 2015, Page(s) 57-74, ISBN 978-3-319-27239-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-27239-9_4 A General Framework for Redactable Signatures and New Constructions Author(s): David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Published in: Information Security and Cryptology - ICISC 2015, 2016, Page(s) 3-19, ISBN 978-3-319-30840-1 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-30840-1_1 Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability Author(s): Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer Published in: Topics in Cryptology - CT-RSA 2016, 2016, Page(s) 127-143, ISBN 978-3-319-29485-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-29485-8_8 Cloud Security and Privacy by Design Author(s): Thomas Lorünser, Thomas Länger, Daniel Slamanig Published in: E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015, Page(s) 202-206, ISBN 978-3-319-27164-4 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-27164-4_16 Towards a New Paradigm for Privacy and Security in Cloud Services Author(s): Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig Published in: Cyber Security and Privacy, 2015, Page(s) 14-25, ISBN 978-3-319-25360-2 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-25360-2_2 Signatures and Efficient Proofs on Committed Graphs and NP-Statements Author(s): Thomas Groß Published in: Financial Cryptography and Data Security, 2015, Page(s) 293-314, ISBN 978-3-662-47854-7 Publisher: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-47854-7_18 Formal Treatment of Privacy-Enhancing Credential Systems Author(s): Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen Published in: Selected Areas in Cryptography - SAC 2015, 2016, Page(s) 3-24, ISBN 978-3-319-31301-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-31301-6_1 Securing the Internet of Things – Security and Privacy in a Hyperconnected World Author(s): Elias Z. Tragos, Henrich C. Pöhls, Ralf C. Staudemeyer, Daniel Slamanig, Adam Kapovits, Santiago Suppan, Alexandros Fragkiadakis, Gianmarco Baldini, Ricardo Neisse, Peter Langendörfer, Zoya Dyka, Christian Wittke Published in: Building the Hyperconnected Society, Issue 29/06/2015, 2015, Page(s) 189-219, ISBN 978-87-93237-99-5 Publisher: River Publishers Monographic books (2) Homomorphic Signature Schemes Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann Published in: SpringerBriefs in Computer Science, 2016, ISBN 978-3-319-32115-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-32115-8 Privately and Publicly Verifiable Computing Techniques Author(s): Denise Demirel, Lucas Schabhüser, Johannes Buchmann Published in: SpringerBriefs in Computer Science, 2017, ISBN 978-3-319-53798-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-53798-6 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available