Protean Signature Schemes

Title

Protean Signature Schemes

Authors

Stephan Krenn (AIT), Henrich C. Pöhls (UNI PASSAU), Kai Samelin (IBM Research Zurich), Daniel Slamanig (AIT)

Abstract

We introduce the notion of Protean Signature schemes. This novel type of signature scheme allows to remove and edit signer-chosen parts of signed messages by a semi-trusted third party simultaneously.

Read more

D6.5 – Test and Evaluation Report of Pilot Domain 2 (eHealth)

Contributing Partners

FOKUS, KGH, GUF

Executive Summary

The eHealth pilot is one of the domain-specific applications developed to showcase functionalities offered by CREDENTIAL Wallet, providing authentication and authorization mechanism combined with novel cryptographic technologies, like proxy re-encryption. This document describes how the pilot testing has been carried out for both the patient and the doctors app.

Read more

D6.6 – Test and Evaluation Report of Pilot Domain 3 (eBusiness)

Contributing Partners

ICERT

Executive Summary

The e-Business pilot integrates CREDENTIAL components and services to showcase the technologies of proxy re-encryption and redactable signatures developed among the project partners. In particular, it integrates the authentication and authorization flows offered by the Wallet service and it uses the crypto libraries developed within this project to manage re-encrypted data.

Read more

D6.4 – Test and Evaluation Report of Pilot Domain 1 (eGovernment)

Contributing Partners

LISPA

Executive Summary

The eGovernment pilot is one of the domain-specific application developed to showcase functionalities offered by CREDENTIAL Wallet, providing authentication and authorization mechanism combined with novel cryptographic technologies, like proxy re-encryption and redactable signatures. This document describes how the pilot has been tested, both with quantitative and qualitative criteria, according to KPIs defined in deliverable D6.1: in that document, clear key performance indicators to keep track of were defined, and how to take actions within the pilot in order to measure them.

Read more

D6.8 – Authorisations and Notifications

Contributing Partners

AIT, FOKUS, ICERT, KGH, LISPA, OTE

Executive Summary

This document contains a collection of all consent forms signed by the pilot participants within the CREDENTIAL project, thereby complementing deliverables D8.1, D8.2, and D8.3 that contained the necessary approvals from the Ethics Committee and our external ethics advisor.

Read more

D3.2 – UI Prototypes v2 and HCI Patterns

Contributing Partners

KAU, SIC, TUG, KGH, ICERT, OTE, LISPA, FOKUS, ATOS

Executive Summary

CREDENTIAL is an EU-funded Horizon 2020 project that involves developing, testing and presenting cloud-based services for storing, managing and sharing digital identity information and personal data with a higher level of security than existing technology.

Read more

D6.2 Identity Wallet Service

Contributing Partners 

AIT, ATOS, OTE, GUF, TUG, FOKUS, ICERT, LISPA, KGH

Executive Summary
On a high level, the central goal of the CREDENTIAL project is to develop a privacy-preserving data sharing platform (wallet) with an integrated identity provider (IdP), which can be used to share authenticated data without the wallet learning any of the user’s personal information.

Read more

D1.5 Year 2 Management and Progress Report

Contributing Partners 

AIT, ATOS, FOKUS, GUF, TUGRAZ, OTE, ICERT, KAU, KGH, LISPA, SIC

Executive Summary 

CREDENTIAL is an innovation action scheduled for 3 years (36 month) in the domain of security and privacy for cloud computing. This report titled “D1.5 Year 2 Management and Progress Report” gives an overview on the project’s progress and achievements between April 2017 and December 2017, i.e.,

Read more

D4.3 Recommendations for Improving Identity Protocols

Contributing Partners 

AIT, ATOS, FOKUS, GUF, TUG, KGH, LISPA

Executive Summary
On a high level, the central goal of the CREDENTIAL project is to develop a privacy-preserving data sharing platform, where even data mediating services - in particular identity providers (IdP) for managing users’ identifying and demographic data - are unable to learn about any of the user’s personal information.

Read more