Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elena Pagnin is active.

Publication


Featured researches published by Elena Pagnin.


international cryptology conference | 2016

Multi-key Homomorphic Authenticators

Dario Fiore; Aikaterini Mitrokotsa; Luca Nizzardo; Elena Pagnin

Homomorphic authenticators HAs enable a client to authenticate a large collection of data elements


IEEE Communications Letters | 2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours

Elena Pagnin; Gerhard P. Hancke; Aikaterini Mitrokotsa


Security and Communication Networks | 2017

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin; Aikaterini Mitrokotsa

m_1, \ldots , m_t


security and cryptography for networks | 2018

Matrioska: A Compiler for Multi-key Homomorphic Signatures.

Dario Fiore; Elena Pagnin


cryptology and network security | 2018

\(\mathsf {HIKE}\): Walking the Privacy Trail

Elena Pagnin; Carlo Brunetta; Pablo Picazo-Sanchez

and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator vouching for the correctness of the output y of a function f computed on the outsourced data, i.e.,


international conference on cryptology in india | 2014

On the Leakage of Information in Biometric Authentication

Elena Pagnin; Christos Dimitrakakis; Aysajan Abidin; Aikaterini Mitrokotsa


Future Generation Computer Systems | 2018

HB+DB: Distance bounding meets human based authentication

Elena Pagnin; Anjia Yang; Qiao Hu; Gerhard P. Hancke; Aikaterini Mitrokotsa

y=fm_1, \ldots , m_t


wireless network security | 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding

Elena Pagnin; Anjia Yang; Gerhard P. Hancke; Aikaterini Mitrokotsa


nordic conference on secure it systems | 2014

Attacks on Privacy-Preserving Biometric Authentication

Aysajan Abidin; Elena Pagnin; Aikaterini Mitrokotsa

. Recently researchers have focused on HAs as a solution, with minimal communication and interaction, to the problem of delegating computation on outsourced data. The notion of HAs studied so far, however, only supports executions and proofs of correctness of computations over data authenticated by a single user. Motivated by realistic scenarios ubiquitous computing, sensor networks, etc. in which large datasets include data provided by multiple users, we study the concept of multi-key homomorphic authenticators. In a nutshell, multi-key HAs are like HAs with the extra feature of allowing the holder of public evaluation keys to compute on data authenticated under different secret keys. In this paper, we introduce and formally define multi-key HAs. Secondly, we propose a construction of a multi-key homomorphic signature based on standard lattices and supporting the evaluation of circuits of bounded polynomial depth. Thirdly, we provide a construction of multi-key homomorphic MACs based only on pseudorandom functions and supporting the evaluation of low-degree arithmetic circuits. Albeit being less expressive and only secretly verifiable, the latter construction presents interesting efficiency properties.


IEEE Transactions on Mobile Computing | 2018

Two-Hop Distance-Bounding Protocols: Keep Your Friends Close

Anjia Yang; Elena Pagnin; Aikaterini Mitrokotsa; Gerhard P. Hancke; Duncan S. Wong

Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection method. We describe how existing distance-bounding protocols could be modified to verify the proximity of both next-hop and two-hop neighbours. This approach allows a node to verify that another node is a physical next-hop neighbour, and also detects legitimate neighbours who make dishonest claims as to who their neighbours are. This approach could prevent dishonest neighbours from hoarding traffic as the result of advertising false two-hop routes.

Collaboration


Dive into the Elena Pagnin's collaboration.

Top Co-Authors

Avatar

Aikaterini Mitrokotsa

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Gerhard P. Hancke

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Anjia Yang

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Aysajan Abidin

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Carlo Brunetta

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Christos Dimitrakakis

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Pablo Picazo-Sanchez

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Cristina Onete

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge