Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements

  • Alaa Alaqra
  • Simone Fischer-HübnerEmail author
  • Thomas Groß
  • Thomas Lorünser
  • Daniel Slamanig
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 476)


This paper summarises the results of a workshop at the IFIP Summer School 2015 introducing the EU Horizon 2020 project Prismacloud, that is, Privacy and Security Maintaining Services in the Cloud. The contributions of this summary are three-fold. Firstly, it provides an overview to the Prismacloud cryptographic tools and use-case scenarios that were presented as part of this workshop. Secondly, it distills the discussion results of parallel focus groups. Thirdly, it summarises a “Deep Dive on Crypto” session that offered technical information on the new tools. Overall, the workshop aimed a outlining application scenarios and eliciting end-user requirements for Prismacloud.


Privacy Cloud computing Functional signatures Malleable signatures Graph signatures Anonymous credentials User requirements 



The authors have received funding from the the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644962 (Prismacloud project). A special thanks to the workshop participants for their input.


  1. 1.
    Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable signatures. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Bleikertz, S., Groß, T.: A virtualization assurance language for isolation and deployment. In: POLICY. IEEE, June 2011Google Scholar
  3. 3.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 501–519. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  5. 5.
    Camenisch, J.: Concepts around privacy-preserving attribute-based credentials - making authentication with anonymous credentials practical. In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity Management for Emerging Services and Technologies. IFIP Advances in Information and Communication Technology, vol. 421, pp. 53–63. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  6. 6.
    Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514–519. Springer, Heidelberg (2014)Google Scholar
  7. 7.
    Groß, T.: Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs. In: Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security (CCSW 2014). pp. 69–80. ACM (2014)Google Scholar
  8. 8.
    Groß, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293–314. Springer, Heidelberg (2015)CrossRefGoogle Scholar
  9. 9.
    Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Lorüenser, T., Happe, A., Slamanig, D.: ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing. In: IEEE 7th CloudCom 2015, IEEE, Vancouver, November 30–3 December (2015)Google Scholar
  11. 11.
    Lorünser, T., Rodriguez, C.B., Demirel, D., Fischer-Hübner, S., Groß, T., Länger, T., des Noes, M., Pöhls, H.C., Rozenberg, B., Slamanig, D.: Towards a new paradigm for privacy and security in cloud services. In: Cleary, F., Felici, M. (eds.) Cyber Security and Privacy. Communications in Computer and Information Science, vol. 530, pp. 14–25. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-25360-2_2 CrossRefGoogle Scholar
  12. 12.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 285–304. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2016

Authors and Affiliations

  • Alaa Alaqra
    • 1
  • Simone Fischer-Hübner
    • 1
    Email author
  • Thomas Groß
    • 2
  • Thomas Lorünser
    • 3
  • Daniel Slamanig
    • 4
  1. 1.Karlstad UniversityKarlstadSweden
  2. 2.Newcastle UniversityNewcastleUK
  3. 3.Austrian Institute of TechnologySeibersdorfAustria
  4. 4.Graz University of TechnologyGrazAustria

Personalised recommendations