Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Simkin is active.

Publication


Featured researches published by Mark Simkin.


public key cryptography | 2016

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Nils Fleischhacker; Johannes Krupp; Giulio Malavolta; Jonas Schneider; Dominique Schröder; Mark Simkin

In a sanitizable signature scheme the signer allows a designated third party, called the sanitizer, to modify certain parts of the message and adapt the signature accordingly. Ateniese et al. ESORICS 2005 introduced this primitive and proposed five security properties which were formalized by Brzuska et al.i¾?PKC 2009. Subsequently, Brzuska et al. PKC 2010 suggested an additional security notion, called unlinkability which says that one cannot link sanitized message-signature pairs of the same document. Moreover, the authors gave a generic construction based on group signatures that have a certain structure. However, the special structure required from the group signature scheme only allows for inefficient instantiations. Here, we present the first efficient instantiation of unlinkable sanitizable signatures. Our construction is based on a novel type of signature schemes with re-randomizable keys. Intuitively, this property allows to re-randomize both the signing and the verification key separately but consistently. This allows us to sign the message with a re-randomized key and to prove in zero-knowledge that the derived key originates from either the signer or the sanitizer. We instantiate this generic idea with Schnorr signatures and efficient


financial cryptography | 2015

VeriStream – A Framework for Verifiable Data Streaming

Dominique Schöder; Mark Simkin


european symposium on research in computer security | 2014

Ubic: Bridging the Gap Between Digital Cryptography and the Physical World

Mark Simkin; Dominique Schröder; Andreas Bulling; Mario Fritz

\varSigma


public key cryptography | 2016

Nearly Optimal Verifiable Data Streaming

Johannes Krupp; Dominique Schröder; Mark Simkin; Dario Fiore; Giuseppe Ateniese; Stefan Nuernberger


applied cryptography and network security | 2014

WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP

Michael Backes; Rainer W. Gerling; Sebastian Gerling; Stefan Nürnberger; Dominique Schröder; Mark Simkin

Σ-protocols, which we convert into non-interactive zero-knowledge proofs via the Fiat-Shamir transformation. Our construction is at least one order of magnitude faster than instantiating the generic scheme of Brzuska et al.i¾?with the most efficient group signature schemes.


international cryptology conference | 2018

Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings

Ivan Damgård; Claudio Orlandi; Mark Simkin

In a Verifiable Data Streaming (VDS) protocol a computationally weak client outsources his storage to an untrusted storage provider. Later, the client can efficiently append and update data elements in the already outsourced and authenticated data set. Other users can stream arbitrary subsets of the authenticated data and verify their integrity on-the-fly, using the data owner’s public verification key. In this work, we present VeriStream, a fully-fledged framework for verifiable data streaming with integration into Dropbox. At its core, our framework is based upon a novel construction of an authenticated data structure, which is the first one that allows verifiable data streams of unbounded length and at the same time outperforms the best known constructions in terms of bandwidth and computational overhead. We provide a detailed performance evaluation, showing that VeriStreamonly incurs a small bandwidth overhead, while providing various security guarantees, such as freshness, integrity, authenticity, and public verifiability, at the same time.


applied cryptography and network security | 2018

Continuously Non-malleable Codes with Split-State Refresh.

Antonio Faonio; Jesper Buus Nielsen; Mark Simkin; Daniele Venturi

Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework that allows users to bridge the gap between digital cryptography and the physical world. Ubic relies on head-mounted displays, like Google Glass, resource-friendly computer vision techniques as well as mathematically sound cryptographic primitives to provide users with better security and privacy guarantees. The framework covers key cryptographic primitives, such as secure identification, document verification using a novel secure physical document format, as well as content hiding. To make a contribution of practical value, we focused on making Ubic as simple, easily deployable, and user friendly as possible.


public key cryptography | 2018

Compact Zero-Knowledge Proofs of Small Hamming Weight

Ivan Damgård; Ji Luo; Sabine Oechsner; Peter Scholl; Mark Simkin

The problem of verifiable data streaming VDS considers the setting in which a client outsources a large dataset to an untrusted server and the integrity of this dataset is publicly verifiable. A special property of VDS is that the client can append additional elements to the dataset without changing the public verification key. Furthermore, the client may also update elements in the dataset. All previous VDS constructions follow a hash-tree-based approach, but either have an upper bound on the size of the database or are only provably secure in the random oracle model. In this work, we give the first unbounded VDS constructions in the standard model. We give two constructions with different trade-offs. The first scheme follows the line of hash-tree-constructions and is based on a new cryptographic primitive called Chameleon Vector Commitment CVC, that may be of independent interest. A CVC is a trapdoor commitment scheme to a vector of messages where both commitments and openings have constant size. Due to the tree-based approach, integrity proofs are logarithmic in the size of the dataset. The second scheme achieves constant size proofs by combining a signature scheme with cryptographic accumulators, but requires computational costs on the server-side linear in the number of update-operations.


computer and communications security | 2014

POSTER: Enhancing Security and Privacy with Google Glass

Johannes Krupp; Dominique Schröder; Mark Simkin

HTTPS is the standard for confidential and integrity-protected communication on the Web. However, it authenticates the server, not its content. We present WebTrust, the first comprehensive authenticity and integrity framework that allows on-the-fly verification of static, dynamic, and real-time streamed Web content from untrusted servers. Our framework seamlessly integrates into HTTP and allows to validate streamed content progressively at arrival. Our performance results demonstrate both the practicality and efficiency of our approach.


IACR Cryptology ePrint Archive | 2018

Oblivious RAM with Small Storage Overhead.

Michael Raskin; Mark Simkin

We present a very simple yet very powerful idea for turning any passively secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.

Collaboration


Dive into the Mark Simkin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniele Venturi

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge