Elena Pagnin
Chalmers University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Elena Pagnin.
international cryptology conference | 2016
Dario Fiore; Aikaterini Mitrokotsa; Luca Nizzardo; Elena Pagnin
Homomorphic authenticators HAs enable a client to authenticate a large collection of data elements
IEEE Communications Letters | 2015
Elena Pagnin; Gerhard P. Hancke; Aikaterini Mitrokotsa
Security and Communication Networks | 2017
Elena Pagnin; Aikaterini Mitrokotsa
m_1, \ldots , m_t
security and cryptography for networks | 2018
Dario Fiore; Elena Pagnin
cryptology and network security | 2018
Elena Pagnin; Carlo Brunetta; Pablo Picazo-Sanchez
and outsource them, along with the corresponding authenticators, to an untrusted server. At any later point, the server can generate a short authenticator vouching for the correctness of the output y of a function f computed on the outsourced data, i.e.,
international conference on cryptology in india | 2014
Elena Pagnin; Christos Dimitrakakis; Aysajan Abidin; Aikaterini Mitrokotsa
Future Generation Computer Systems | 2018
Elena Pagnin; Anjia Yang; Qiao Hu; Gerhard P. Hancke; Aikaterini Mitrokotsa
y=fm_1, \ldots , m_t
wireless network security | 2015
Elena Pagnin; Anjia Yang; Gerhard P. Hancke; Aikaterini Mitrokotsa
nordic conference on secure it systems | 2014
Aysajan Abidin; Elena Pagnin; Aikaterini Mitrokotsa
. Recently researchers have focused on HAs as a solution, with minimal communication and interaction, to the problem of delegating computation on outsourced data. The notion of HAs studied so far, however, only supports executions and proofs of correctness of computations over data authenticated by a single user. Motivated by realistic scenarios ubiquitous computing, sensor networks, etc. in which large datasets include data provided by multiple users, we study the concept of multi-key homomorphic authenticators. In a nutshell, multi-key HAs are like HAs with the extra feature of allowing the holder of public evaluation keys to compute on data authenticated under different secret keys. In this paper, we introduce and formally define multi-key HAs. Secondly, we propose a construction of a multi-key homomorphic signature based on standard lattices and supporting the evaluation of circuits of bounded polynomial depth. Thirdly, we provide a construction of multi-key homomorphic MACs based only on pseudorandom functions and supporting the evaluation of low-degree arithmetic circuits. Albeit being less expressive and only secretly verifiable, the latter construction presents interesting efficiency properties.
IEEE Transactions on Mobile Computing | 2018
Anjia Yang; Elena Pagnin; Aikaterini Mitrokotsa; Gerhard P. Hancke; Duncan S. Wong
Distance-bounding protocols allow devices to cryptographically verify the physical proximity of two parties and is a prominent secure neighbour detection method. We describe how existing distance-bounding protocols could be modified to verify the proximity of both next-hop and two-hop neighbours. This approach allows a node to verify that another node is a physical next-hop neighbour, and also detects legitimate neighbours who make dishonest claims as to who their neighbours are. This approach could prevent dishonest neighbours from hoarding traffic as the result of advertising false two-hop routes.