Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alexander Schaub is active.

Publication


Featured researches published by Alexander Schaub.


information security | 2016

A Trustless Privacy-Preserving Reputation System

Alexander Schaub; Rémi Bazin; Omar Hasan; Lionel Brunie

Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as e-commerce websites. However, existing systems often disclose the identity of the raters, which might deter honest users from submitting reviews out of fear of retaliation from the ratees. While many privacy-preserving reputation systems have been proposed, we observe that none of them is simultaneously truly decentralized, trustless, and suitable for real world usage in, for example, e-commerce applications. In this paper, we present a blockchain based decentralized privacy-preserving reputation system. We demonstrate that our system provides correctness and security while eliminating the need for users to trust any third parties or even fellow users.


conference on risks and security of internet and systems | 2014

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms

Alexander Schaub; Emmanuel Schneider; Alexandros Hollender; Vinicius Calasans; Laurent Jolie; Robin Touillon; Annelie Heuser; Sylvain Guilley; Olivier Rioul

Web applications are subject to several types of attacks. In particular, side-channel attacks consist in performing a statistical analysis of the web traffic to gain sensitive information about a client. In this paper, we investigate how side-channel leaks can be used on search engines such as Google or Bing to retrieve the client’s search query. In contrast to previous works, due to payload randomization and compression, it is not always possible to uniquely map a search query to a web traffic signature and hence stochastic algorithms must be used. They yield, for the French language, an exact recovery of search word in more than \(30\) % of the cases. Finally, we present some methods to mitigate such side-channel leaks.


Cryptography | 2018

On the Performance and Security of Multiplication in GF(2N)

Jean-Luc Danger; Youssef El Housni; Adrien Facon; Cheikh Thiécoumba Gueye; Sylvain Guilley; Sylvie Herbel; Ousmane Ndiaye; Edoardo Persichetti; Alexander Schaub

Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algorithm and one of the submissions to the National Institute of Standards and Technology’s (NIST) Post-Quantum Cryptography (PQC) standardization call.


international conference on trust management | 2017

Self-reported Verifiable Reputation with Rater Privacy

Rémi Bazin; Alexander Schaub; Omar Hasan; Lionel Brunie

Reputation systems are a major feature of every modern e-commerce website, helping buyers carefully choose their service providers and products. However, most websites use centralized reputation systems, where the security of the system rests entirely upon a single Trusted Third Party. Moreover, they often disclose the identities of the raters, which may discourage honest users from posting frank reviews due to the fear of retaliation from the ratees. We present a reputation system that is decentralized yet secure and efficient, and could therefore be applied in a practical context. In fact, users are able to retrieve the reputation score of a service provider directly from it in constant time, with assurance regarding the correctness of the information obtained. Additionally, the reputation system is anonymity-preserving, which ensures that users can submit feedback without their identities being associated to it. Despite this anonymity, the system still offers robustness against attacks such as ballot-stuffing and Sybil attacks.


international conference on peer-to-peer computing | 2015

Design and analysis of an improved bitmessage anti-spam mechanism

Alexander Schaub; Dario Rossi

The BitMessage protocol offers privacy to its anonymous users. It is a completely decentralized messaging system, enabling users to exchange messages preventing accidental eavesdropping - a nice features in the Post-Snowden Internet Era. Not only messages are sent to every node on the network (making it impossible to understand the intended recipient), but their content is encrypted with the intended recipient public key (so that s/he only can decipher it). As these two properties combined might facilitate spamming, a proof-of-work (PoW) mechanism has been designed to mitigate this threat: only messages exhibiting properties of the PoW are forwarded on the network: since PoW is based on computationally heavy cryptographic functions, this slows down the rate at which spammers can introduce unsolicited messages in the network on the one hand, but also makes it harder to send legitimate messages for regular users on the other hand. In this paper, we (i) carry on an analysis of the current PoW mechanism, (ii) propose a very simple, yet very effective, generalization of the formula that decouples spammers vs legitimate users penalty showing that (iii) at the optimum, our proposal halves the harm spammers can do, avoiding by definition any impact for legitimate users.


IACR Cryptology ePrint Archive | 2016

A trustless privacy-preserving reputation system.

Alexander Schaub; Rémi Bazin; Omar Hasan; Lionel Brunie


IACR Cryptology ePrint Archive | 2016

A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.

Rémi Bazin; Alexander Schaub; Omar Hasan; Lionel Brunie


digital systems design | 2018

An Improved Analysis of Reliability and Entropy for Delay PUFs

Alexander Schaub; Jean-Luc Danger; Sylvain Guilley; Olivier Rioul


2018 IEEE 3rd International Verification and Security Workshop (IVSW) | 2018

Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms

Adrien Facon; Sylvain Guilley; Matthieu Lec'Hvien; Alexander Schaub; Youssef Souissi


The 31st IFIP International Information Security and Privacy Conference (SEC 2016) | 2016

A Trustless Privacy Preserving Reputation System based on Blockchain

Alexander Schaub; Rémi Bazin; Omar Hasan; Lionel Brunie

Collaboration


Dive into the Alexander Schaub's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge