-
Chapter and Conference Paper
On the Privacy Enhancement of In-Transit Health Data Inspection: A Preliminary Study
A new healthcare paradigm has emerged lately placing patients at the center of the healthcare scenario, providing more control over their data. Allowing patients to access data from outside healthcare organiza...
-
Chapter and Conference Paper
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredients to privacy-friendly authentication systems. They allow users to obtain credentials on attributes and prove possession of these creden...
-
Chapter and Conference Paper
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use, and Legal Issues
The project “ABC4Trust – Attribute-based Credentials for Trust” presented its two pilot trials in a workshop and engaged participants in discussions on the two existing as well as potential future application ...
-
Chapter and Conference Paper
On the Security of Distributed Multiprime RSA
Threshold RSA encryption and signing is a very useful tool to increase the security of the secret keys used. Key generation is, however, either done in a non-threshold way, or computationally inefficient proto...
-
Chapter and Conference Paper
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...
-
Chapter and Conference Paper
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
In this paper, we investigate on threshold proofs, a framework for distributing the prover’s side of interactive proofs of knowledge over multiple parties. Interactive proofs of knowledge (PoK) are widely used pr...
-
Chapter and Conference Paper
Efficient, Robust and Constant-Round Distributed RSA Key Generation
We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one ite...
-
Chapter and Conference Paper
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and whe...