Abstract. We study the problem of privacy-preserving proofs on authenticated data in which a party receives data from a trusted source and is requested to prove statements over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source — even without having access to that source. This problem is motivated by various scenarios emerging from several application areas such as wearable computing, smart metering, or general business-tobusiness interactions. Furt...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
We present a proof system that allows efficient verification of NP statements, given proofs produced...
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices...
We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, ...
We study the problem of privacy-preserving proofs on authenticated data, where a party receives data...
In the digital era, users share their personal data with service providers to obtain some utility, e...
In distance-bounding authentication protocols, a verifier confirms that a prover is (1) legitimate a...
Privacy preserving protocols typically involve the use of Zero Knowledge (ZK) proofs, which allow a ...
International audienceIn distance-bounding authentication protocols, a verifier assesses that a prov...
A distributed proof system is an effective way for deriving useful information by combining data fro...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
This thesis studies security of various cryptographic primitives which provide for data authenticati...
Abstract. This paper shows a new method which promotes ownership of data by people about whom the da...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
We present a proof system that allows efficient verification of NP statements, given proofs produced...
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices...
We study the problem of privacy-preserving proofs on streamed authenticated data. In this setting, ...
We study the problem of privacy-preserving proofs on authenticated data, where a party receives data...
In the digital era, users share their personal data with service providers to obtain some utility, e...
In distance-bounding authentication protocols, a verifier confirms that a prover is (1) legitimate a...
Privacy preserving protocols typically involve the use of Zero Knowledge (ZK) proofs, which allow a ...
International audienceIn distance-bounding authentication protocols, a verifier assesses that a prov...
A distributed proof system is an effective way for deriving useful information by combining data fro...
Often service providers need to outsource computations on sensitive datasets and subsequently publis...
This thesis studies security of various cryptographic primitives which provide for data authenticati...
Abstract. This paper shows a new method which promotes ownership of data by people about whom the da...
Today, it is common practice to outsource time-consuming computations to the cloud. Using the cloud...
A distributed proof system is an effective way for deriv-ing useful information by combining data fr...
With computation power in the cloud becoming a commodity, it is more and more convenient to outsourc...
We present a proof system that allows efficient verification of NP statements, given proofs produced...
Crowd-sourced sensing systems allow people to voluntarily contribute sensor data from mobile devices...