Livrables
This report will present the use-case and requirements, based on empirical data, of the mix networking infrastructure, with a focus on usability, a mathematical analysis of the privacy set, and threat models.
Complete Exploitation PlanWe will update D2.5 with exploitation activities already performed including definition of business models for market adoption of results of the project.
Minimum Viable Product (MVP)A functional, deployable, and demonstrable mix-net service implemented according to results and requirements from WP3, WP5, WP6 and WP7.
Report on Exploitation Activities and Updated Plan for Further ExploitationFinal update of the exploitation plan will be presented and a list of exploitation activities performed during the last year of the project will be reported.
Requirements and User Interface DesignDocuments including a first version of the evotingsystem
Initial reportModelling and Design elements. Describes some of the existing shuffle protocols (WP3.2), initial design options for mix-nets (WP3.1) and definitions of privacy (WP3.3)
Dissemination Report IDissemination reports will be delivered each year and the dissemination plan will be updated if necessary.
Survey/Statistics: Interim reportInterim report including requirements analysis and initial design. This report will describe the results of the requirements analysis and outline the initial design used to start the implementation.
Modelling, Design and Analysis:Interim reportFirst iteration of a NIZK shuffle proof. Describes the shuffle protocol that may be used in implementation within WP5; Integrates robustness into efficient mix-net designs and decryption mixes; proposes robust definitions of mix-nets as differentially private mechanisms
Final Review and AssessmentThis deliverable will review and assess the activities, results, and progresses of Y3. This will provide a basis for each consortium member to engage in further EU projects with increased performance and efficiency.
Dissemination PlanA dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1.
Final report validation & testingThis report will summarize the results of the validation and testing including lessons learned. It will provide guidance to future adopters of the system.
Integrated SystemA fully integrated, tested, and documented system, incorporating any updated requirements and designs from the experience of the MVP that can be disseminated.
Y1 Review and AssessmentThis deliverable will review and assess the activities, results, and progresses of Y1. This will provide a basis for moving into Y2 and examine where the consortium was successful and where improvements are needed for the following year.
Final reportFinal iteration of the NIZK shuffle proof together with security analysis, and an implementation; validation of mix-net design options and refinement of definitions to suit other WPs
Standardisation ReportThe standardization-related efforts and achievements will be collected in this report.
Y2 Review and AssessmentThis deliverable will review and assess the activities, results, and progresses of Y2. This will provide a basis for moving into Y3 and examine where the consortium was successful and where improvements are needed for the following year.
Ethics reportThe ethics report details all procedures that will be implemented for data collection, storage, protection, retention and destruction and confirmation of personal information by Panoramix partners. Copies of ethical approvals by the competent Ethics Committee and copies of approvals for the collection of personal data by the competent University Data Protection Officer / National Data Protection authority will be included, and in case of data not publicly available, relevant authorisations will also be provided if applicable. This deliverable will also contain templates of the informed consent form to be used.
Scientific Advisory Board ReportsAfter each EAB meeting EAB will write a report with observations, recommendations and conclusions on actions for increasing the project impact. A summary of all reports will be compiled at the end of the project.
Dissemination Report IIDissemination reports will be delivered each year and the dissemination plan will be updated if necessary.
Dissemination Report IIIDissemination reports will be delivered each year and the dissemination plan will be updated if necessary.
Preliminary Exploitation PlanIn this deliverable the first version of exploitation plan will be presented. It will be aligned with the consortium partners’ business plans and market evaluation.
Analysis of User FeedbackBased on the user feedback from the deployment of mix networking with email, we will determine whether or not users found the privacy sufficient. This report will also include the feedback from the living lab research, where the mobile message app is tested with 1000 test users.
Final SystemA production-ready system and a corresponding internet service incorporating any external feedback and addressing any remaining integration issues.
Initial Requirements, Design, and PrototypeThe first version of the system that addresses basic concerns in all three tasks that do not depend on other work packages, requirements addressing the state-of-the-art industry environments, design addressing development methodology and tools, and prototype addressing development, deployment, and the testing environment.
This deliverable, available as code on GitHub with a brief developer guide to the code, will allow system administrators to deploy the mixnetworking infrastructure for email, with clients for desktop and mobile (Android).
Integrated ServiceThe integrated service implements the full feature set and incorporates adjustments after the experience with the MVP.
Final ServiceThe final version of the e-voting service, fully documented for developers and users, and proven in production conditions.
A viable demonstration of the designs and capabilities developed by Task 5.2, in a first integration with the mix-net service.
A public webpage will be created and updated throughout the duration of the project.
Publications
Auteurs:
Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig
Publié dans:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 2015, Page(s) 1441-1454
Éditeur:
ACM
Auteurs:
Prastudy Fauzi and Helger Lipmaa
Publié dans:
Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, 2016, Page(s) 200-216
Éditeur:
Springer International Publishing
Auteurs:
Jamie Hayes and George Danezis
Publié dans:
25th USENIX Security Symposium 2016, 2016, Page(s) 1187--1203
Éditeur:
USENIX Association
Auteurs:
Harry Halpin, Patrick J. Hayes, and Henry S.Thompson
Publié dans:
Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015, 2015, Page(s) 47-60
Éditeur:
Springer International Publishing
Auteurs:
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu
Publié dans:
IEEE European Symposium on Security and Privacy, 2016, Page(s) 276-291
Éditeur:
IEEE
Auteurs:
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
Publié dans:
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016, Page(s) 365-382
Éditeur:
ACM
Auteurs:
Helger Lipmaa
Publié dans:
Progress in Cryptology - AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, 2016, Page(s) 185-206
Éditeur:
Springer International Publishing
Auteurs:
Luca Melis, George Danezis and Emiliano De Cristofaro
Publié dans:
23nd Annual Network and Distributed System Security Symposium, NDSS, 2016, 2016
Éditeur:
The Internet Society
Auteurs:
Piotrowska, A. M.; Hayes, J.; Gelernter, N.; Danezis, G.; Herzberg, A.
Publié dans:
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES '17). (pp. pp. 5-15). Association for Computing Machinery (ACM): New York, NY, USA. (2017), Numéro 1, 2017
Éditeur:
ACM
Auteurs:
Mavroudis, Vasilios; Veale, Michael
Publié dans:
In: Proceedings of Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET: London, UK. (2018), Numéro 1, 2018
Éditeur:
IET
DOI:
10.31228/OSF.IO/8QN9F
Auteurs:
Overdorf, Rebekah; Kulynych, Bogdan; Balsa, Ero; Troncoso, Carmela; Gürses, Seda
Publié dans:
Numéro 1, 2018
Éditeur:
arXiv
Auteurs:
Weggenmann, Benjamin; Kerschbaum, Florian
Publié dans:
Numéro 1, 2018
Éditeur:
ACM
Auteurs:
Mavroudis, V.; Cerulli, A.; Svenda, P.; Cvrcek, D.; Klinec, D.; Danezis, G.
Publié dans:
In: Evans, D and Malkin, T and Xu, D, (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1583-1600). ACM: New York, USA. (2017), Numéro 1, 2017
Éditeur:
ACM
Auteurs:
Toledo, R. R.; Danezis, G. D.; Echizen, I. E.
Publié dans:
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society. (pp. pp. 51-61). ACM: New York, USA. (2017), Numéro 1, 2017
Éditeur:
ACM
Auteurs:
Prastudy Fauzi, Helger Lipmaa and Michał Zając.
Publié dans:
Advances in Cryptology - ASIACRYPT 2016, 2016
Éditeur:
Springer International Publishing
Auteurs:
George Danezis, Sarah Meiklejohn
Publié dans:
Proceedings 2016 Network and Distributed System Security Symposium, 2016, ISBN 1-891562-41-X
Éditeur:
Internet Society
DOI:
10.14722/ndss.2016.23187
Auteurs:
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Publié dans:
Computer Security – ESORICS 2016, 2016, Page(s) 27-46
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-45744-4_2
Auteurs:
Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
Publié dans:
Computer Security – ESORICS 2016, 2016, Page(s) 173-195
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-45744-4_9
Auteurs:
George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias
Publié dans:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1690-1701, ISBN 9781-450341394
Éditeur:
ACM Press
DOI:
10.1145/2976749.2978383
Auteurs:
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Publié dans:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 2016, Page(s) 1317-1328, ISBN 9781-450341394
Éditeur:
ACM Press
DOI:
10.1145/2976749.2978352
Auteurs:
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publié dans:
Advances in Cryptology – ASIACRYPT 2016, 2016, Page(s) 902-933
Éditeur:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-53890-6_30
Auteurs:
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
Publié dans:
Public-Key Cryptography – PKC 2017, 2017, Page(s) 36-66
Éditeur:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-54388-7_2
Auteurs:
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publié dans:
Public-Key Cryptography – PKC 2017, 2017, Page(s) 305-334
Éditeur:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-54388-7_11
Auteurs:
Helger Lipmaa
Publié dans:
21st International Conference on Financial Cryptography and Data Security 2017, 2017
Éditeur:
IACR
Auteurs:
Helger Lipmaa and Kateryna Pavly
Publié dans:
21st International Conference on Financial Cryptography and Data Security 2017, 2017
Éditeur:
IACR
Auteurs:
Jonas Böhler, Daniel Bernau, Florian Kerschbaum
Publié dans:
Data and Applications Security and Privacy XXXI. DBSec 2017, 2017, Page(s) 225-238
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-61176-1_12
Auteurs:
Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
Publié dans:
USENIX Security Symposium 2017, 2017
Éditeur:
USENIX Association
Auteurs:
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
Publié dans:
USENIX Security Symposium 201, 2017
Éditeur:
USENIX Association
Auteurs:
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Publié dans:
Advances in Cryptology – CRYPTO 2017, 2017, Page(s) 357-388
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-63688-7_12
Auteurs:
Juan Garay, Aggelos Kiayias, Nikos Leonardos
Publié dans:
Advances in Cryptology – CRYPTO 2017, 2017, Page(s) 291-323
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-63688-7_10
Auteurs:
Tariq Elahi, Joan A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro volume 4, 2016, 2016, Page(s) 83-101, ISSN 2299-0984
Éditeur:
Walter De Gruyter GmbH
Auteurs:
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro Volume 4, 2016, 2016, Page(s) 37-61, ISSN 2299-0984
Éditeur:
De Gruyter
Auteurs:
Raphael R. Toledo, George Danezis, Ian Goldberg
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro Volume 4, 2016, 2016, Page(s) 184–201, ISSN 2299-0984
Éditeur:
De Gruyter
Auteurs:
Giovanni Cherubin, Jamie Hayes, Marc Juarez
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro 2017/2, 2017, ISSN 2299-0984
Éditeur:
De Gruyter Open
DOI:
10.1515/popets-2017-0023
Auteurs:
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publié dans:
IEEE Security & Privacy, Numéro 15/3, 2017, Page(s) 14-23, ISSN 1540-7993
Éditeur:
IEEE Computer Society
DOI:
10.1109/MSP.2017.71
Auteurs:
Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna
Publié dans:
Proceedings on Privacy Enhancing Technologies, Numéro 2017/2, 2017, ISSN 2299-0984
Éditeur:
De Gruyter Open
DOI:
10.1515/popets-2017-0018
Auteurs:
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Publié dans:
Information and Computer Security, Numéro 25/1, 2017, Page(s) 100-116, ISSN 2056-4961
Éditeur:
Emerald Publishing Limited
DOI:
10.1108/ics-07-2016-0056
Auteurs:
Florian Kerschbaum, Mathias Kohler, Florian Hahn and Daniel Bernau
Publié dans:
2016
Éditeur:
SAP Internal Product Security Research
Auteurs:
Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, and Claudia
Diaz
Publié dans:
2016
Éditeur:
KU Leuven
Auteurs:
Hicks, Alexander; Mavroudis, Vasilios; Al-Bassam, Mustafa; Meiklejohn, Sarah; Murdoch, Steven J.
Publié dans:
Numéro 1, 2018
Éditeur:
arXiv
Auteurs:
Helger Lipmaa
Publié dans:
Financial Cryptography and Data Security, Numéro 10322, 2017, Page(s) 182-203, ISBN 978-3-319-70971-0
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-70972-7_10
Auteurs:
Helger Lipmaa, Kateryna Pavlyk
Publié dans:
Financial Cryptography and Data Security, Numéro 10322, 2017, Page(s) 621-638, ISBN 978-3-319-70971-0
Éditeur:
Springer International Publishing
DOI:
10.1007/978-3-319-70972-7_35
Droits de propriété intellectuelle
Numéro de demande/publication:
US
15/881,958
Date:
2018-01-29
Numéro de demande/publication:
EP
17001769
Date:
2017-10-26
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible