- Cryptography and Data Security
- Access Control and Trust
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Complexity and Algorithms in Graphs
- Service-Oriented Architecture and Web Services
- Advanced Authentication Protocols Security
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Distributed systems and fault tolerance
- Information and Cyber Security
- Peer-to-Peer Network Technologies
- Logic, Reasoning, and Knowledge
- Privacy, Security, and Data Protection
- Data Privacy and Cybersecurity
- Mobile Agent-Based Network Management
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Comparative constitutional jurisprudence studies
- Safety Systems Engineering in Autonomy
- Digital and Cyber Forensics
- Open Source Software Innovations
- Bluetooth and Wireless Communication Technologies
Universidad de Málaga
2013-2023
Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute function on their private inputs, obtaining the output at end and nothing more. In this work, we focus particular SMPC problem named Private Set Intersection (PSI). The challenge in PSI how two or more can intersection input sets, while elements that are not remain private. This has attracted attention many researchers because its wide variety applications, contributing proliferation different...
The use of alternative foundations for constructing more secure and efficient cryptographic schemes is a topic worth exploring. In the case proxy re-encryption, vast majority are based on number theoretic problems such as discrete logarithm. this paper we present NTRUReEncrypt, new bidirectional multihop re-encryption scheme NTRU, widely known lattice-based cryptosystem. We provide two versions our scheme: first one conventional NTRU encryption and, although it lacks security proof, remains...
The inclusion of identity management in the cloud computing landscape represents a new business opportunity for providing what has been called Identity Management as Service (IDaaS). Nevertheless, IDaaS introduces same kind problems regarding privacy and data confidentiality other services; on top that, nature outsourced information (users' identity) is critical. Traditionally, services (including IDaaS) rely only SLAs security policies to protect data, but these measures have proven...
New mobility paradigms have appeared in recent years, and everything suggests that some more are coming. This fact makes apparent the necessity of modernizing road infrastructure, signalling elements traffic management systems. Many initiatives emerged around term Intelligent Transport System (ITS) order to define new scenarios requirements for this kind applications. We even two main competing technologies implementing Vehicular communication protocols (V2X), C-V2X 802.11p, but neither them...
Over the last decade, Cloud Computing paradigm has emerged as a panacea for many problems in traditional IT infrastructures. Much been said about potential of context Smart Grid, but unfortunately it is still relegated to second layer when comes critical systems. Although advantages outsourcing these kinds applications cloud clear, data confidentiality and operational privacy stand mayor drawbacks. In this paper, we describe some security mechanisms, specifically, cryptographic schemes, that...
Proxy Re-Encryption (PRE) is a type of Public-Key Encryption (PKE) that provides an additional re-encryption functionality. Although PRE inherently more complex than PKE, attack models for have not been developed further those inherited from PKE. In this paper we address gap and define parametric family PRE, based on the availability both decryption oracles during security game. This enables definition set intermediate notions ranges "plain" IND-CPA to "full" IND-CCA. We analyze some...
Abstract Several generic methods exist for achieving chosen‐ciphertext attack (CCA)‐secure public‐key encryption schemes from weakly secure cryptosystems, such as the Fujisaki–Okamoto and REACT transformations. In context of proxy re‐encryption (PRE), it would be desirable to count on analogous constructions that allow PRE achieve better security notions. this paper, we study adaptation these transformations find both negative positive results. On one hand, show why is not possible directly...
Assurance has been a major topic for critical systems. is usually associated with safety conditions but also an important role checking security requirements. Security best assured if it addressed holistically, systematically, and from the very beginning in software's development process. We propose to integrate assurance system by letting different stages of life-cycle be mapped structure case.
Among Big Data technologies, Hadoop stands out for its capacity to store and process large-scale datasets. However, although was not designed with security in mind, it is widely used by plenty of organizations, some which have strong data protection requirements. Traditional access control solutions are enough, cryptographic must be put place protect sensitive information. In this paper, we describe a cryptographically-enforced system Hadoop, based on proxy re-encryption. Our proposed...