Risultati finali
A first prototype implementing the core features of the privacy enhanced digital currency prototype, following the specification from D7.1, which should be sufficient to start the testing phase.
First version of the IoT key distribution prototypeA first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase.
Final implementation of the IoT key distribution prototypeThe final implementation of the prototype should strictly adhere to the specification defined in D7.2.
First version of the truly anonymous data collection prototypeA first prototype implementing the core features of the prototype, following the specification from D7.1, which should be sufficient to start the testing phase.
Final implementation of the truly anonymous data collection prototypeThe final implementation of the prototype should strictly adhere to the specification defined in D7.2
Final implementation of the privacy enhanced digital currency prototypeThe final implementation of the privacy enhanced digital currency prototype should strictly adhere to the specification defined in D7.2.
This deliverable describes the activities regarding standardisation that were carried out during the whole 38 months of the project and summarises the plans and actions for these activities for the rest of the project.
Performance Analyses 2Performance results will be reported and techniques used to improve the speed of the schemes will be described.
Final Legal Compliance ReportThis deliverable will concern the legal validation and review of the data management in the project as well as its compliance with regulatory norms. It will serve as a final assessment of the project from a legal, privacy, security and ethical point of view and shall, if necessary, include further recommendations for future use of the developed technologies.
Annual Communication Activities Report Y1This deliverable describes the communication activities that were carried out during the first project year.
Project Advisory Board Workshop Reports Y2These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results.
Annual Dissemination Report & Material Y1This deliverable describes the dissemination activities and material that were carried out and produced during the first year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities.
Final Report on Hardware-operated schemesThis deliverable describes the results of the work on the hardware-operates schemes (Task 5.4) obtained until M30. These results include the design and specification to implement the required Functional Encryption schemes and modules on FPGAs.
Annual Communication Activities Report Y3This deliverable describes the communication activities that were carried out during the third project year.
Annual Communication Activities Report Y2This deliverable describes the communication activities that were carried out during the second project year.
Exploitation ReportThis deliverable updates D2.13-D2.15 based on the finalised developments and validation of the FENTEC project, and includes a report on exploitation activities performed. It includes a definition of business models and commercialization strategies suitable for market adoption of efficient and application-oriented Functional Encryption technology in different market segments.
Preliminary specification of FENTEC prototypesPreliminary specification of the desired outcome, the environment, and the performance goal for privacy-preserving data collection, IOT and data analytics prototype.
Project Advisory Board Workshop Reports Y1These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results.
Annual Dissemination Report & Material Y3This deliverable describes the dissemination activities and material that were carried out and produced during the third year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities.
Annual Report on Functional Encryption schemes with richer Functionality Y1This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis.
Project Advisory Board Workshop Reports Y3These deliverables summarise the discussions and conclusions of the project advisory board meetings and conference and describe how they will affect the activities of the project and the exploitation of the results.
Legal Requirement Analysis ReportThis Deliverable will present an overview of the applicable ethical and legal framework, as well as relevant privacy, data protection and security principles. It will identify the requirements that are to be met by the technologies developed as part of the project and provide high level guidelines on how compliance can be realized and risks might be mitigated in order to ensure that fundamental principles are accounted for following the Privacy-by-Design methodology.
Annual Report on post-quantum safe Functional Encryption schemes Y3Annual Report on post-quantum safe Functional Encryption schemes
Final Report on Information Leakage CountermeasuresThis Deliverable describes the methods and techniques to formally analyse the information leakage in FE schemes, most notably those developed in Task 4.1 to 4.3, and minimize it.
Security and Trust ModelsThis deliverable describes the requirements for hardware-supported functional encryption schemes, including trust, adversary, and security models from the analysis of Task 5.1.
Preliminary Report on Information Leakage CountermeasuresThis Deliverable describes the methods and techniques to formally analyse the information leakage in FE schemes, most notably those developed in Task 4.1 to 4.3, and minimize it.
Annual Report on post-quantum safe Functional Encryption schemes Y2This Deliverable describes the quantum-safe FE constructions along a formal security analysis.
Dissemination PlanThis deliverable describes specific plans for dissemination of the results of the project. It will help in coordinating the dissemination activities so that they ensure maximal impact for the results of the project.
Final Report on Security TestsThis deliverable will give a final summary of the security of the implemented hardware modules in Tasks 5.2-4, collecting results and reporting preliminary and final conclusions from security tests.
Annual Report on Functional Encryption schemes for Prototypes Y3This Deliverable describes the FE constructions for the specific use cases being considered in the FENTEC project along a formal security analysis.
Final specification of FENTEC prototypesRe-specification of the desired outcome, the environment, and the performance goal for the prototypes. The technical report will describe the final features that will be implemented, including quantifiable information such as number of users/devices, frequency of API calls.
Final Report on Hardware-assisted schemesThis deliverable describes the results of the work on the hardware-assisted schemes (Task 5.3) obtained until M29. This final report contains descriptions of the full hardware implementations of hardware-assisted functional encryption schemes and, in particular, the designs of the required hardware modules.
Preliminary Standardisation ReportThis deliverable describes the activities regarding standardisation that were carried out during the first 18 months of the project and summarises the plans and actions for these activities for the rest of the project.
Annual Dissemination Report & Material Y2This deliverable describes the dissemination activities and material that were carried out and produced during the second year of the project and updates subsequently the initial dissemination plan. This includes, for example, the list of scientific publications produced by the project as well as the summaries of those publications and other dissemination activities
Annual Report on post-quantum safe Functional Encryption schemes Y1This Deliverable describes the quantum-safe FE constructions along a formal security analysis.
Annual Report on Functional Encryption schemes with richer Functionality Y3This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis.
Legal Framework ReportThis will focus on providing more detailed methods of implementing the abovementioned requirements. They will be based on continuous cooperation with the technical partners and will reflect ongoing developments in both the project as well as in the European policy and legal framework. The legal requirements on privacy, data protection, security and ethics, as identified in Task 3.3 will herein be applied to specific FENTECH scenarios on the basis of the provided use cases. A requirements monitoring table will be developed.
Final Report on Hardware-optimized schemesThis deliverable describes the results of the work on the hardware-optimized schemes (Task 5.2) obtained until M28. This final report includes descriptions of the hardware implementations of the functional encryption schemes developed by FENTEC and novel methods and techniques (both architectural and algorithmic) for their efficient computation.
Final performance report for FENTEC prototypes after second cycleThe report will measure and compare the performance of each prototype after the first implementation cycle, evaluating them in effective conditions, and validate the relevance and global objectives of the FENTEC project.
Exploitation PlanThis deliverable, also including an initial market analysis, describes the preliminary plans (consortium/project-wide as well as partner-specific) for exploitation activities that will be carried out for the results of the project (M24).
Annual Report on Functional Encryption schemes with richer Functionality Y2This Deliverable describes the FE constructions for functionalities beyond linear functions along a formal security analysis.
This deliverable will be the API implementation of the schemes designed in the project. (D6.3) This deliverable also will contain documentation on how to use the API along some code examples.
Functional Encryption Toolset API DesignThis deliverable will provide a design of the API and report on the implementation of the existing functional encryption schemes.
This deliverable is the website of the project that includes both public website that provides public information about FENTEC, the partners, and the results of the project as well as a private site where the partners can communicate and share project related information to each other and the project advisory board.
Pubblicazioni
Autori:
M. Bahadori, K. Järvinen
Pubblicato in:
2020
Editore:
FPL 2020
Autori:
Angshuman Karmakar, Jose Maria Bermudo Mera
Pubblicato in:
2020
Editore:
TCHES 2020
Autori:
Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
Pubblicato in:
2020
Editore:
DAC2020
Autori:
Sebastian Gajek, Marco Lewandowsky
Pubblicato in:
2020
Editore:
FPDAPP 2020
Autori:
J. Chotard, E. Dufour Sans, R. Gay, D.H. Phan, D. Pointcheval
Pubblicato in:
2020
Editore:
CRYPTO 2020
Autori:
Michel Abdalla, Dario Catalano, Romain Gay and Bodgan Ursu
Pubblicato in:
2020
Editore:
Advances in Cryptology – ASIACRYPT 2020
Autori:
FENTEC
Pubblicato in:
2018
Editore:
fentec.eu
Autori:
Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Pubblicato in:
Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19, 2019, Pagina/e 1-6, ISBN 9781-450367257
Editore:
ACM Press
DOI:
10.1145/3316781.3317887
Autori:
Miha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, and Tilen Marc
Pubblicato in:
2019
Editore:
IFIPTM 2019
Autori:
M. Bahadori, K. Järvinen
Pubblicato in:
2020
Editore:
DSD/AHSA 2020
Autori:
Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak and Jolanda Modic
Pubblicato in:
2019
Editore:
ESORICS 2019 The European Symposium on Research in Computer, Luxembourg Security
Autori:
Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede
Pubblicato in:
2020
Editore:
ACM- Journal on Emerging Technologies in Computing Systems, 2020
Autori:
Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner
Pubblicato in:
2020
Editore:
SCN2020
Autori:
Danaja Fabčič Povše
Pubblicato in:
2020
Editore:
IFIP summer school
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
Yolan Romailler, Nils Amiet (KUD)
Pubblicato in:
2020
Editore:
KUD website
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
ATOS
Pubblicato in:
2018
Editore:
BigData Magazine
Autori:
ATOS
Pubblicato in:
2018
Editore:
El Candelero tecnológico
Autori:
ATOS
Pubblicato in:
2018
Editore:
Computing
Autori:
ATOS
Pubblicato in:
2018
Editore:
Data Center Market
Autori:
ATOS
Pubblicato in:
2018
Editore:
CyberSecurity News
Autori:
ATOS
Pubblicato in:
2018
Editore:
Redes Telecom
Autori:
ATOS
Pubblicato in:
2018
Editore:
Atos Worlwide website
Autori:
FENTEC Consortium
Pubblicato in:
2018
Editore:
Enpowerment for everyone
Autori:
ATOS
Pubblicato in:
2018
Editore:
IT User
Autori:
ATOS
Pubblicato in:
2018
Editore:
Conectrónica
Autori:
ATOS
Pubblicato in:
2018
Editore:
Telemática y ciberseguridad
Autori:
ATOS
Pubblicato in:
2018
Editore:
Digital affaires
Autori:
FENTEC Consortium
Pubblicato in:
2018
Editore:
fentec.eu
Autori:
ATOS
Pubblicato in:
2019
Editore:
CyberSecurity News
Autori:
ATOS
Pubblicato in:
2019
Editore:
Conectronica
Autori:
ATOS
Pubblicato in:
2019
Editore:
Economía de hoy
Autori:
ATOS
Pubblicato in:
2019
Editore:
Teleinterview for El País
Autori:
ATOS
Pubblicato in:
2019
Editore:
Cloud Computing
Autori:
ATOS
Pubblicato in:
2019
Editore:
Zona Movilidad
Autori:
ATOS
Pubblicato in:
2019
Editore:
Tecnonews
Autori:
Kudelski
Pubblicato in:
2019
Editore:
kudelskisecurity.com
Autori:
ATOS
Pubblicato in:
2018
Editore:
http://www.fentec.eu/
Autori:
ATOS
Pubblicato in:
2019
Editore:
Cope Lleida Radio - fentec.eu
Autori:
ATOS
Pubblicato in:
2019
Editore:
fentec.eu
Autori:
Miguel Angel Mateo (ATOS)
Pubblicato in:
2019
Editore:
fentec.eu
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Forbes
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
Cyberwatching
Autori:
FENTEC Consortium
Pubblicato in:
2020
Editore:
FENTEC Consortium
Autori:
ATOS
Pubblicato in:
2020
Editore:
Data Center Market
Autori:
Milad Bahadori, Kimmo Jarvinen
Pubblicato in:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Numero 28/10, 2020, Pagina/e 2182-2195, ISSN 1063-8210
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tvlsi.2020.3010585
Autori:
Ward Beullens, Hoeteck Wee
Pubblicato in:
Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Numero 11443, 2019, Pagina/e 254-283, ISBN 978-3-030-17258-9
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-17259-6_9
Autori:
Edouard Dufour-Sans, David Pointcheval
Pubblicato in:
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Numero 11464, 2019, Pagina/e 426-441, ISBN 978-3-030-21567-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-21568-2_21
Autori:
Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner
Pubblicato in:
Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Numero 11443, 2019, Pagina/e 128-157, ISBN 978-3-030-17258-9
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-17259-6_5
Autori:
Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Pubblicato in:
Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Numero 10991, 2018, Pagina/e 597-627, ISBN 978-3-319-96883-4
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-96884-1_20
Autori:
Jie Chen, Junqing Gong, Hoeteck Wee
Pubblicato in:
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Numero 11273, 2018, Pagina/e 673-702, ISBN 978-3-030-03328-6
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-03329-3_23
Autori:
Ward Beullens, Bart Preneel, Alan Szepieniec
Pubblicato in:
Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Numero 11349, 2019, Pagina/e 300-321, ISBN 978-3-030-10969-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-10970-7_14
Autori:
Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
Pubblicato in:
Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Numero 11273, 2018, Pagina/e 703-732, ISBN 978-3-030-03328-6
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-03329-3_24
Autori:
Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
Pubblicato in:
Advances in Cryptology – EUROCRYPT 2018, Numero 10820, 2018, Pagina/e 503-534, ISBN 978-3-319-78380-2
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-78381-9_19
Autori:
Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi
Pubblicato in:
Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Numero 11405, 2019, Pagina/e 127-148, ISBN 978-3-030-12611-7
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-12612-4_7
Autori:
Danaja Fabčič Povše
Pubblicato in:
2020
Editore:
Intersentia
Autori:
Romain Gay
Pubblicato in:
Cryptography and Security [cs.CR]. PSL Research University, 2019. English, Numero 3, 2019
Editore:
PSL Research University
Autori:
Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy and Ingrid Verbauwhede
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero Volume 2018, Numero 3, 2018, Pagina/e 243-266, ISSN 2569-2925
Editore:
Ruhr-Universitat Bochum
DOI:
10.13154/tches.v2018.i3.243-266
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile