talk – Chalmers Security Seminar

The Simplest Multi-key Linearly Homomorphic Signature Scheme

We consider the problem of outsourcing computation on data authenticated by different users. Our aim is to describe and implement the simplest possible solution to provide data integrity in cloud-based scenarios. Read More ›

talk – Chalmers Security Seminar

The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains

We investigate the security of smart contracts within a blockchain that can fork (as Bitcoin and Ethereum). In particular, we focus on multi-party computation (MPC) protocols run on-chain with the aid of smart contracts, and observe that honest players face the following dilemma: Should I rush sending protocol's messages based on the current view of the blockchain, or rather wait that a message is confirmed on the chain before sending the next one? Read More ›

talk – Chalmers Security Seminar

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting

As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses. This paper focuses on one of the most acclaimed messaging applications: Signal. Read More ›

talk – Chalmers Security Seminar

Trusted Execution Environments for Privacy-preserving Cloud Applications

An overview of popular trusted execution environments (TEEs), with special emphasis on Intel's SGX. Read More ›

talk – Chalmers Security Seminar

CLIO: Cryptographically Secure Information Flow Control on Key-Value Stores

Cryptography can in principle be used to protect users' data when stored or transmitted, but in practice is error-prone and can potentially result in a violation of a user's security concerns. Read More ›