- document
-
van Schaick, Bart (author)Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...master thesis 2023
- document
-
Keijzer, T. (author)Without us realizing it, solutions for safety and security are present all around us. However, everyone has undoubtedly also experienced how inconvenient some safety and security measures can be. For example, think about security checks at the airport, the need to wear a bicycle helmet, or being asked to perform 2-factor authentication to log...doctoral thesis 2023
- document
-
Zhou, Junwei (author), Lei, Botian (author), Lang, Huile (author), Panaousis, Emmanouil (author), Liang, K. (author), Xiang, Jianwen (author)Genotype imputation estimates missing genotypes from the haplotype or genotype reference panel in individual genetic sequences, which boosts the potential of genome-wide association and is essential in genetic data analysis. However, the genetic sequences involve people's privacy, confirming an individual's identification and even disease...journal article 2023
- document
-
Hartel, P.H. (author), van Wegberg, R.S. (author)Law enforcement agencies struggle with criminals using end-to-end encryption (E2EE). A recent policy paper states: “while encryption is vital and privacy and cyber security must be protected, that should not come at the expense of wholly precluding law enforcement”. The main argument is that E2EE hampers attribution and prosecution of...journal article 2023
- document
-
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...journal article 2023
- document
-
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...journal article 2023
- document
-
Galvan Hernández, Jan Andres (author)The recent advances in the semiconductor industry have given rise to the development of highly scalable, wireless and battery-free neural-implant interfaces that enable brain monitoring and brain stimulation with high spatial and temporal resolution. Such implants are referred to as Free-Floating Neural Implants (FFNI), as the small size and...master thesis 2022
- document
-
Granneman, Erik (author)The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...master thesis 2022
- document
-
Bubberman, Wolf (author)Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of the research in the field of SCA shifted towards the application...master thesis 2022
- document
-
Memar Zahedani, Armin (author)Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auctioneer aggregates the offers into demand and supply curves to...master thesis 2022
- document
-
Lambregts, Steven (author)Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, these leakages are caused by practical designs but are considered an...master thesis 2022
- document
-
Grishkov, Ilya (author)This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and...bachelor thesis 2022
- document
-
Stobbe, Pieter (author)Currently, encryption is part of daily life, from commercial to industrial applications. Secure, long-distance communication is vital to the safe and reliable operation of industrial feedback control. Utilising public networks as a medium is often cost-effective at the risk of a security breach. Current industrial feedback control systems...master thesis 2022
- document
-
Joosen, Floor (author)Privacy and security are important topics in data aggregation, as companies are aggregating large amounts of sensitive data from their users. The aim of this paper is to improve the security and privacy of data aggregation using smart contracts, homomorphic encryption and post-quantum encryption methods on Hyperledger Fabric. After a literature...bachelor thesis 2022
- document
-
Vega Sanchez, Julio (author)The increasing demand for sharing Internet of Things (IoT) increases demand for a secure way of sharing data. Smart contracts could provide this because of its distributed nature. Proxy re-encryption is an encryption (PRE) method that can be used to share information. In this paper, a secure data sharing scheme is presented that uses multi-hop...bachelor thesis 2022
- document
-
Park, Chaiwon (author)A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....bachelor thesis 2022
- document
-
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...journal article 2022
- document
-
Bulină, Malina (author)Data outsourcing has become one of the primary means for preserving information as it passes the responsibility of storage management to the service provider. However, storing sensitive data remotely poses privacy threats for the data owners. Searchable encryption (SE) is a technique that allows performing search queries over encrypted data. The...bachelor thesis 2022
- document
-
Lu, Hai (author), Yu, Ruyun (author), Zhu, Yan (author), He, Xiao (author), Liang, K. (author), Chu, William Cheng-Chung (author)Attribute-Based Encryption (ABE) plays an important role in current secure data sharing through fine-grained customizable policies. However, the existing ABE schemes only support simple predicates, = and ≠, but cannot express a more general membership predicates, ∈ and ∉, in policies. The low expressivity of ABE will enlarge the ciphertext...journal article 2022
- document
-
Liu, Suhui (author), Chen, Liquan (author), Wang, Huaqun (author), Fu, S. (author), Shi, Lin (author)Wireless body area networks (WBAN) enable ubiquitous monitoring of patients, which can change the future of healthcare services overwhelmingly. As the collected data of patients usually contain sensitive information, how to collect, transfer, store and share data securely and properly has become a concerning issue. Attribute-based encryption ...journal article 2022