D5.5 IAM Reference Component Library

Contributing Partners 

AIT, ATOS, FOKUS, TUG, SIC

Executive Summary 

This report documents the second iteration implementation of CREDENTIAL Wallet components. These components provide the core functionalities that enable the integration of the pilot applications and subsequently the piloting phases. The implementation follows the functional design detailed in D5.1.

Read more

D5.4 Security Protocols Reference Component Library

Contributing Partners 

SIC, OTE, TUG, FOKUS, ATOS, AIT, KGH

Executive Summary 

The CREDENTIAL project requires several fundamental cryptographic primitives, algorithms and protocols. Those components are developed and documented within the scope of this deliverable.
As the resulting library is used within platform dependent software on client side as well as on server side it was decided to split the library into three basic components, the Java Library for Cryptographic Primitives, the Android Crypto Library with Key Management Implementation and the PRE/RS File Format Library resulting in a modular and ecient framework.

Read more

D5.6 Reference Environment

Contributing Partners

AIT, ATOS, FOKUS, TUG, OTE, KGH, LISPA, SIC

Executive Summary

This report gives an overview of the process to develop and integrate the various components to finally compose a reference environment of the CREDENTIAL ecosystem.
First, the development environment provides the infrastructure used to enable an efficient development process.

Read more

Secure and Privacy-Friendly Storage and Data Processing in the Cloud

Title

Secure and Privacy-Friendly Storage and Data Processing in the Cloud

Authors

Pasquale Chiaro (ICERT) , Simone Fischer-Hübner (KAU), Thomas Groß (University of Newcastle upon Tyne), Stephan Krenn (AIT), Thomas Lorünser (AIT), Ana Isabel Martı́nez Garcı́a (ETRA Investigacion y Desarrollo), Andrea Migliavacca (LISPA), Kai Rannenberg (GUF), Daniel Slamanig (AIT), Christoph Striecks (AIT), and Alberto Zanini (LISPA)

Abstract

At the IFIP Summer School 2017, the two H2020 projects CREDENTIAL and PRISMACLOUD co-organized a workshop dedicated to introducing the necessary background knowledge and demonstrating prototypes of privacy-preserving solutions for storing, sharing, and processing potentially sensitive data in untrusted cloud environments.

Read more

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Title

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Authors

David Derler (TUG), Stephan Krenn (AIT), Thomas Lorünser (AIT), Sebastian Ramacher (TUG), Daniel Slamanig (AIT), Christoph Striecks (AIT)

Abstract

We revisit the notion of proxy re-encryption (PRE), an enhanced public-key encryption primitive envisioned by Blaze et al.

Read more

Helping Johnny to Make Informed Decisions in the Context of Social Login

Title

Helping Johnny to Make Informed Decisions in the Context of Social Login

Authors

Farzaneh Karegar, Nina Gerber, Melanie Volkamer, Simone Fischer-Hübner

Abstract

Users have to make two privacy-related decisions when signing up for a new web service: (1) whether to use an existing Single Sign-On (SSO) account of an Identity Provider (IdP) and (2) what information the IdP is allowed to share and for how long with the Service Provider (SP).

Read more