Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Privacy and Accountability in Networks via Optimized Randomized Mix-nets

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Applying Mix Nets to Email Document (se abrirá en una nueva ventana)

This report will present the use-case and requirements, based on empirical data, of the mix networking infrastructure, with a focus on usability, a mathematical analysis of the privacy set, and threat models.

Complete Exploitation Plan (se abrirá en una nueva ventana)

We will update D2.5 with exploitation activities already performed including definition of business models for market adoption of results of the project.

Minimum Viable Product (MVP) (se abrirá en una nueva ventana)

A functional, deployable, and demonstrable mix-net service implemented according to results and requirements from WP3, WP5, WP6 and WP7.

Report on Exploitation Activities and Updated Plan for Further Exploitation (se abrirá en una nueva ventana)

Final update of the exploitation plan will be presented and a list of exploitation activities performed during the last year of the project will be reported.

Requirements and User Interface Design (se abrirá en una nueva ventana)

Documents including a first version of the evotingsystem

Initial report (se abrirá en una nueva ventana)

Modelling and Design elements. Describes some of the existing shuffle protocols (WP3.2), initial design options for mix-nets (WP3.1) and definitions of privacy (WP3.3)

Dissemination Report I (se abrirá en una nueva ventana)

Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary.

Survey/Statistics: Interim report (se abrirá en una nueva ventana)

Interim report including requirements analysis and initial design. This report will describe the results of the requirements analysis and outline the initial design used to start the implementation.

Modelling, Design and Analysis:Interim report (se abrirá en una nueva ventana)

First iteration of a NIZK shuffle proof. Describes the shuffle protocol that may be used in implementation within WP5; Integrates robustness into efficient mix-net designs and decryption mixes; proposes robust definitions of mix-nets as differentially private mechanisms

Final Review and Assessment (se abrirá en una nueva ventana)

This deliverable will review and assess the activities, results, and progresses of Y3. This will provide a basis for each consortium member to engage in further EU projects with increased performance and efficiency.

Dissemination Plan (se abrirá en una nueva ventana)

A dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1.

Final report validation & testing (se abrirá en una nueva ventana)

This report will summarize the results of the validation and testing including lessons learned. It will provide guidance to future adopters of the system.

Integrated System (se abrirá en una nueva ventana)

A fully integrated, tested, and documented system, incorporating any updated requirements and designs from the experience of the MVP that can be disseminated.

Y1 Review and Assessment (se abrirá en una nueva ventana)

This deliverable will review and assess the activities, results, and progresses of Y1. This will provide a basis for moving into Y2 and examine where the consortium was successful and where improvements are needed for the following year.

Final report (se abrirá en una nueva ventana)

Final iteration of the NIZK shuffle proof together with security analysis, and an implementation; validation of mix-net design options and refinement of definitions to suit other WPs

Standardisation Report (se abrirá en una nueva ventana)

The standardization-related efforts and achievements will be collected in this report.

Y2 Review and Assessment (se abrirá en una nueva ventana)

This deliverable will review and assess the activities, results, and progresses of Y2. This will provide a basis for moving into Y3 and examine where the consortium was successful and where improvements are needed for the following year.

Ethics report (se abrirá en una nueva ventana)

The ethics report details all procedures that will be implemented for data collection, storage, protection, retention and destruction and confirmation of personal information by Panoramix partners. Copies of ethical approvals by the competent Ethics Committee and copies of approvals for the collection of personal data by the competent University Data Protection Officer / National Data Protection authority will be included, and in case of data not publicly available, relevant authorisations will also be provided if applicable. This deliverable will also contain templates of the informed consent form to be used.

Scientific Advisory Board Reports (se abrirá en una nueva ventana)

After each EAB meeting EAB will write a report with observations, recommendations and conclusions on actions for increasing the project impact. A summary of all reports will be compiled at the end of the project.

Dissemination Report II (se abrirá en una nueva ventana)

Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary.

Dissemination Report III (se abrirá en una nueva ventana)

Dissemination reports will be delivered each year and the dissemination plan will be updated if necessary.

Preliminary Exploitation Plan (se abrirá en una nueva ventana)

In this deliverable the first version of exploitation plan will be presented. It will be aligned with the consortium partners’ business plans and market evaluation.

Analysis of User Feedback (se abrirá en una nueva ventana)

Based on the user feedback from the deployment of mix networking with email, we will determine whether or not users found the privacy sufficient. This report will also include the feedback from the living lab research, where the mobile message app is tested with 1000 test users.

Final System (se abrirá en una nueva ventana)

A production-ready system and a corresponding internet service incorporating any external feedback and addressing any remaining integration issues.

Initial Requirements, Design, and Prototype (se abrirá en una nueva ventana)

The first version of the system that addresses basic concerns in all three tasks that do not depend on other work packages, requirements addressing the state-of-the-art industry environments, design addressing development methodology and tools, and prototype addressing development, deployment, and the testing environment.

Open-source code of integrated system for desktops (se abrirá en una nueva ventana)

This deliverable, available as code on GitHub with a brief developer guide to the code, will allow system administrators to deploy the mixnetworking infrastructure for email, with clients for desktop and mobile (Android).

Integrated Service (se abrirá en una nueva ventana)

The integrated service implements the full feature set and incorporates adjustments after the experience with the MVP.

Final Service (se abrirá en una nueva ventana)

The final version of the e-voting service, fully documented for developers and users, and proven in production conditions.

Minimum Viable Product (se abrirá en una nueva ventana)

A viable demonstration of the designs and capabilities developed by Task 5.2, in a first integration with the mix-net service.

Public Web Page and Blog (se abrirá en una nueva ventana)

A public webpage will be created and updated throughout the duration of the project.

Publicaciones

HORNET: High-speed Onion Routing at the Network Layer

Autores: Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig
Publicado en: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 2015, Página(s) 1441-1454
Editor: ACM

Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles

Autores: Prastudy Fauzi and Helger Lipmaa
Publicado en: Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, 2016, Página(s) 200-216
Editor: Springer International Publishing

k-fingerprinting: a Robust Scalable Website Fingerprinting Technique

Autores: Jamie Hayes and George Danezis
Publicado en: 25th USENIX Security Symposium 2016, 2016, Página(s) 1187--1203
Editor: USENIX Association

When owl:sameAs isn't the Same Redux: Towards a Theory of Identity, Context, and Inference on the Semantic Web

Autores: Harry Halpin, Patrick J. Hayes, and Henry S.Thompson
Publicado en: Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015, 2015, Página(s) 47-60
Editor: Springer International Publishing

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)

Autores: Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu
Publicado en: IEEE European Symposium on Security and Privacy, 2016, Página(s) 276-291
Editor: IEEE

Blockchain Mining Games

Autores: Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
Publicado en: Proceedings of the 2016 ACM Conference on Economics and Computation, 2016, Página(s) 365-382
Editor: ACM

Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs

Autores: Helger Lipmaa
Publicado en: Progress in Cryptology - AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, 2016, Página(s) 185-206
Editor: Springer International Publishing

Efficient Private Statistics with Succinct Sketches

Autores: Luca Melis, George Danezis and Emiliano De Cristofaro
Publicado en: 23nd Annual Network and Distributed System Security Symposium, NDSS, 2016, 2016
Editor: The Internet Society

AnNotify: A Private Notification Service

Autores: Piotrowska, A. M.; Hayes, J.; Gelernter, N.; Danezis, G.; Herzberg, A.
Publicado en: In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES '17). (pp. pp. 5-15). Association for Computing Machinery (ACM): New York, NY, USA. (2017), Edición 1, 2017
Editor: ACM

Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces (se abrirá en una nueva ventana)

Autores: Mavroudis, Vasilios; Veale, Michael
Publicado en: In: Proceedings of Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET: London, UK. (2018), Edición 1, 2018
Editor: IET
DOI: 10.31228/OSF.IO/8QN9F

POTs: Protective Optimization Technologies

Autores: Overdorf, Rebekah; Kulynych, Bogdan; Balsa, Ero; Troncoso, Carmela; Gürses, Seda
Publicado en: Edición 1, 2018
Editor: arXiv

SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining

Autores: Weggenmann, Benjamin; Kerschbaum, Florian
Publicado en: Edición 1, 2018
Editor: ACM

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components

Autores: Mavroudis, V.; Cerulli, A.; Svenda, P.; Cvrcek, D.; Klinec, D.; Danezis, G.
Publicado en: In: Evans, D and Malkin, T and Xu, D, (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1583-1600). ACM: New York, USA. (2017), Edición 1, 2017
Editor: ACM

Mix-ORAM: Using Delegated Shuffles

Autores: Toledo, R. R.; Danezis, G. D.; Echizen, I. E.
Publicado en: In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society. (pp. pp. 51-61). ACM: New York, USA. (2017), Edición 1, 2017
Editor: ACM

A Shuffle Argument Secure in the Generic Model

Autores: Prastudy Fauzi, Helger Lipmaa and Michał Zając.
Publicado en: Advances in Cryptology - ASIACRYPT 2016, 2016
Editor: Springer International Publishing

Centrally Banked Cryptocurrencies (se abrirá en una nueva ventana)

Autores: George Danezis, Sarah Meiklejohn
Publicado en: Proceedings 2016 Network and Distributed System Security Symposium, 2016, ISBN 1-891562-41-X
Editor: Internet Society
DOI: 10.14722/ndss.2016.23187

Toward an Efficient Website Fingerprinting Defense (se abrirá en una nueva ventana)

Autores: Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Publicado en: Computer Security – ESORICS 2016, 2016, Página(s) 27-46
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_2

Efficient Encrypted Keyword Search for Multi-user Data Sharing (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
Publicado en: Computer Security – ESORICS 2016, 2016, Página(s) 173-195
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_9

SFADiff - Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning (se abrirá en una nueva ventana)

Autores: George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias
Publicado en: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Página(s) 1690-1701, ISBN 9781-450341394
Editor: ACM Press
DOI: 10.1145/2976749.2978383

Practical Non-Malleable Codes from l-more Extractable Hash Functions (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Publicado en: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Página(s) 1317-1328, ISBN 9781-450341394
Editor: ACM Press
DOI: 10.1145/2976749.2978352

Indistinguishable Proofs of Work or Knowledge (se abrirá en una nueva ventana)

Autores: Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publicado en: Advances in Cryptology – ASIACRYPT 2016, 2016, Página(s) 902-933
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53890-6_30

CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions (se abrirá en una nueva ventana)

Autores: Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
Publicado en: Public-Key Cryptography – PKC 2017, 2017, Página(s) 36-66
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-54388-7_2

Ceremonies for End-to-End Verifiable Elections (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publicado en: Public-Key Cryptography – PKC 2017, 2017, Página(s) 305-334
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-54388-7_11

Optimally Sound Sigma Protocols Under DCRA

Autores: Helger Lipmaa
Publicado en: 21st International Conference on Financial Cryptography and Data Security 2017, 2017
Editor: IACR

A Simpler Rate-Optimal CPIR Protocol.

Autores: Helger Lipmaa and Kateryna Pavly
Publicado en: 21st International Conference on Financial Cryptography and Data Security 2017, 2017
Editor: IACR

Privacy-Preserving Outlier Detection for Data Streams (se abrirá en una nueva ventana)

Autores: Jonas Böhler, Daniel Bernau, Florian Kerschbaum
Publicado en: Data and Applications Security and Privacy XXXI. DBSec 2017, 2017, Página(s) 225-238
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-61176-1_12

The Loopix Anonymity System

Autores: Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
Publicado en: USENIX Security Symposium 2017, 2017
Editor: USENIX Association

MCMix: Anonymous Messaging via Secure Multiparty Computation

Autores: Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
Publicado en: USENIX Security Symposium 201, 2017
Editor: USENIX Association

Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Publicado en: Advances in Cryptology – CRYPTO 2017, 2017, Página(s) 357-388
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_12

The Bitcoin Backbone Protocol with Chains of Variable Difficulty (se abrirá en una nueva ventana)

Autores: Juan Garay, Aggelos Kiayias, Nikos Leonardos
Publicado en: Advances in Cryptology – CRYPTO 2017, 2017, Página(s) 291-323
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-63688-7_10

A Framework for the Game-theoretic Analysis of Censorship Resistance

Autores: Tariq Elahi, Joan A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición volume 4, 2016, 2016, Página(s) 83-101, ISSN 2299-0984
Editor: Walter De Gruyter GmbH

SoK: Making Sense of Censorship Resistance Systems

Autores: Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición Volume 4, 2016, 2016, Página(s) 37-61, ISSN 2299-0984
Editor: De Gruyter

Lower-Cost epsilon-Private Information Retrieval

Autores: Raphael R. Toledo, George Danezis, Ian Goldberg
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición Volume 4, 2016, 2016, Página(s) 184–201, ISSN 2299-0984
Editor: De Gruyter

Website Fingerprinting Defenses at the Application Layer (se abrirá en una nueva ventana)

Autores: Giovanni Cherubin, Jamie Hayes, Marc Juarez
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición 2017/2, 2017, ISSN 2299-0984
Editor: De Gruyter Open
DOI: 10.1515/popets-2017-0023

An Efficient E2E Verifiable E-voting System without Setup Assumptions (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publicado en: IEEE Security & Privacy, Edición 15/3, 2017, Página(s) 14-23, ISSN 1540-7993
Editor: IEEE Computer Society
DOI: 10.1109/MSP.2017.71

On the Privacy and Security of the Ultrasound Ecosystem (se abrirá en una nueva ventana)

Autores: Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición 2017/2, 2017, ISSN 2299-0984
Editor: De Gruyter Open
DOI: 10.1515/popets-2017-0018

Auditing for privacy in threshold PKE e-voting (se abrirá en una nueva ventana)

Autores: Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publicado en: Information and Computer Security, Edición 25/1, 2017, Página(s) 100-116, ISSN 2056-4961
Editor: Emerald Publishing Limited
DOI: 10.1108/ics-07-2016-0056

AWARE: Anonymization With guARanteEd privacy

Autores: Florian Kerschbaum, Mathias Kohler, Florian Hahn and Daniel Bernau
Publicado en: 2016
Editor: SAP Internal Product Security Research

A survey on routing in anonymous communication protocols

Autores: Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, and Claudia Diaz
Publicado en: 2016
Editor: KU Leuven

VAMS: Verifiable Auditing of Access to Confidential Data

Autores: Hicks, Alexander; Mavroudis, Vasilios; Al-Bassam, Mustafa; Meiklejohn, Sarah; Murdoch, Steven J.
Publicado en: Edición 1, 2018
Editor: arXiv

Optimally Sound Sigma Protocols Under DCRA (se abrirá en una nueva ventana)

Autores: Helger Lipmaa
Publicado en: Financial Cryptography and Data Security, Edición 10322, 2017, Página(s) 182-203, ISBN 978-3-319-70971-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70972-7_10

A Simpler Rate-Optimal CPIR Protocol (se abrirá en una nueva ventana)

Autores: Helger Lipmaa, Kateryna Pavlyk
Publicado en: Financial Cryptography and Data Security, Edición 10322, 2017, Página(s) 621-638, ISBN 978-3-319-70971-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70972-7_35

Derechos de propiedad intelectual

DIFFERENTIAL PRIVACY AND OUTLIER DETECTION WITHIN A NONINTERACTIVE MODEL

Número de solicitud/publicación: EP 17001769
Fecha: 2017-10-26
Solicitante(s): SAP SE

Method and System for Automated Text Anonymization

Número de solicitud/publicación: US 15/881,958
Fecha: 2018-01-29
Solicitante(s): SAP SE

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0