Skip to main content

Privacy-Enhancing Cryptography in Distributed Ledgers

Deliverables

Exploitation Strategy and Roadmap

This deliverable describes the exploitation strategies of the (industrial) partners as well as of the project as a whole. (T5.4)

Updated Consolidated Communication and Dissemination Plan

This deliverable consolidates all the dissemination activities uptaken so far and presents a plan for further dissemination. (T5.1)

Initial Communication and Dissemination Plan

This deliverable outlines the initial strategy for communication and dissemination and all the required information on the elements on the website.

Requirements and Interface Design

This document will contain the requirements for all the use cases. The main idea is to have separate requirements for each use case. Note that, there can be privacy issues that could be similar in the use cases. Such cases will lead to similar requirements too. These requirements will be grouped together. (T1.1)

Communication and Dissemination Toolkit

This deliverable includes all the necessary descriptions on project design, template design for presentations, logo, online visual identity, design of posters etc. (T5.2)

Definitions and Notions of Privacy-Enhancing Cryptographic Primitives for Ledgers

This deliverable will present standard and new definitions and notions of privacyenhancing cryptographic primitives that are useful for distributed ledgers. (T2.2)

Quality Assurance Plan

The quality assurance describes the standards, processes and procedures for the expected results of the project. (T6.2)

Project Reference Manual and Tools

The project reference manual and tools outlines all the internal project delivery processes such as mailing lists, deliverable templates, presentation templates etc. (T6.1)

State of the Art of Cryptographic Ledgers

The state of the art in distributed ledgers is summarised focusing on the cryptographic aspects of the existing constructions. (T3.1)

Report on Architecture of Secure Ledger Systems

The deliverable covers the architecture of protocols for secure ledger systems, such as authentication within the infrastructure, solutions for updating the ledger protocols, or results on consensus protocols. (T4.1)

First Scientific & Research Impact Measurement

This deliverable describes the impact of the research results as well as the preliminary implementations. (T6.2)

State of the art on Privacy-Enhancing Cryptography for Ledgers

This deliverable presents the state of the art on privacy-enhancing cryptographic primitives that are useful for distributed ledgers. (T2.1)

Data Management Plan

As PRiVILEDGE is taking part in the Pilot on Open Research Data a first version of the DMP as an early deliverable will be provided within the first six months of the project. The purpose of the DMP is to provide an analysis of the main elements of the data management policy that will be used by the applications with regard to all the datasets that will be generated by the project. The DMP is not a fixed document, but evolves during the lifespan of the project. More developed versions of the plan can therefore be included as additional deliverables at later stages. According to the Guidelines on Data Management in Horizon 2020, the DMP should address data set reference and name, data set description, standards and metadata, data sharing and archiving and preservation (including storage and backup) on a dataset by dataset basis and should reflect the current status of reflection within the consortium about the data that will be produced.

Searching for OpenAIRE data...

Publications

Combining Private Set-Intersection with Secure Two-Party Computation

Author(s): Michele Ciampi, Claudio Orlandi
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 464-482
DOI: 10.1007/978-3-319-98113-0_25

On the Security Properties of e-Voting Bulletin Boards

Author(s): Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 505-523
DOI: 10.1007/978-3-319-98113-0_27

Non-interactive Secure Computation from One-Way Functions

Author(s): Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 118-138
DOI: 10.1007/978-3-030-03332-3_5

Publicly Verifiable Proofs from Blockchains

Author(s): Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Issue 11442, 2019, Page(s) 374-401
DOI: 10.1007/978-3-030-17253-4_13

DL-Extractable UC-Commitment Schemes

Author(s): Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 385-405
DOI: 10.1007/978-3-030-21568-2_19

UC-Secure CRS Generation for SNARKs

Author(s): Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 99-117
DOI: 10.1007/978-3-030-23696-0_6

On the Efficiency of Privacy-Preserving Smart Contract Systems

Author(s): Karim Baghery
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 118-136
DOI: 10.1007/978-3-030-23696-0_7

Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains

Author(s): Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias
Published in: Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I, Issue 11098, 2018, Page(s) 111-131
DOI: 10.1007/978-3-319-99073-6_6

Ouroboros Genesis - Composable Proof-of-Stake Blockchains with Dynamic Availability

Author(s): Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 913-930
DOI: 10.1145/3243734.3243848

On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards

Author(s): Sven Heiberg, Ivo Kubjas, Janno Siim, Jan Willemson
Published in: 2018, Page(s) 259-276