Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wouter Lueks is active.

Publication


Featured researches published by Wouter Lueks.


international conference information security theory and practice | 2015

On Linkability and Malleability in Self-blindable Credentials

Jaap-Henk Hoepman; Wouter Lueks; Sietse Ringers

Self-blindable credential schemes allow users to anonymously prove ownership of credentials. This is achieved by randomizing the credential before each showing in such a way that it still remains valid. As a result, each time a different version of the same credential is presented. A number of such schemes have been proposed, but unfortunately many of them are broken, in the sense that they are linkable i.e., failing to protect the privacy of the user, or malleable i.e., they allow users to create new credentials using one or more valid credentials given to them. In this paper we prove a general theorem that relates linkability and malleability in self-blindable credential schemes, and that can test whether a scheme is linkable or malleable. After that we apply the theorem to a number of self-blindable credential schemes to show that they suffer from one or both of these issues.


financial cryptography | 2015

Sublinear Scaling for Multi-Client Private Information Retrieval

Wouter Lueks; Ian Goldberg

Private information retrieval (PIR) allows clients to retrieve records from online database servers without revealing to the servers any information about what records are being retrieved. To achieve this, the servers must typically do a computation involving the entire database for each query. Previous work by Ishai et al. has suggested using batch codes to allow a single client (or collaborating clients) to retrieve multiple records simultaneously while allowing the server computation to scale sublinearly with the number of records fetched.


information security conference | 2015

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

Wouter Lueks; Gergely Alpár; Jaap-Henk Hoepman; Pim Vullers

Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity. All revocation schemes proposed to date either sacrifice anonymity altogether, require the parties to be online, or put high load on the user or the verifier. As a result, these schemes are either too complicated for low-powered devices like smart cards or they do not scale. We propose a new revocation scheme that has a very low computational cost for users and verifiers, and does not require users to process updates. We trade only a limited, but well-defined, amount of anonymity to make the first practical revocation scheme that is efficient at large scales and fast enough for smart cards.


radio frequency identification security and privacy issues | 2012

Designated attribute-based proofs for RFID applications

Gergely Alpár; Lejla Batina; Wouter Lueks

Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures that the identity of a tag only becomes known to authorised readers. In this paper we generalize this protocol by introducing an attribute-based identification scheme. The proposed scheme preserves the designation of verification (i.e., only an authorised reader is able to learn the identity of a tag) while it allows tags to prove any subset of their attributes to authorised readers. The proposed scheme is proven to be secure and narrow-strong private.


Computers & Security | 2017

Fast revocation of attribute-based credentials for both users and verifiers☆

Wouter Lueks; Gergely Alpár; Jaap-Henk Hoepman; Pim Vullers

Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity. All revocation schemes proposed to date either sacrifice anonymity altogether, require the parties to be online, or put high load on the user or the verifier. As a result, these schemes are either too complicated for low-powered devices such as smart cards or they do not scale. We propose a new revocation scheme that has a very low computational cost for users and verifiers, and does not require users to process updates. We trade only a limited, but well-defined, amount of anonymity to make the first practical revocation scheme that is efficient at large scales and fast enough for smart cards.


privacy forum | 2015

Revocable Privacy: Principles, Use Cases, and Technologies

Wouter Lueks; Maarten H. Everts; Jaap-Henk Hoepman

Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the rule. We first improve the definition of revocable privacy by considering different types of sensors for users’ actions and different types of consequences of violating the rules (for example blocking). Second, we explore some use cases that can benefit from a revocable privacy approach. For each of these, we derive the underlying abstract rule that users should follow. Finally, we describe existing techniques that can implement some of these abstract rules. These descriptions not only illustrate what can already be accomplished using revocable privacy, they also reveal directions for future research.


workshop on privacy in the electronic society | 2016

Vote to Link: Recovering from Misbehaving Anonymous Users

Wouter Lueks; Maarten H. Everts; Jaap-Henk Hoepman

Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation, most of the damage has already been done. To help the service provider to recover from abuse by malicious anonymous users, we propose the vote-to-link system. In the vote-to-link system, moderators (rather than a single trusted third party) can cast votes on a users action if they deem it to be bad. After enough moderators have voted on the action, the service provider can use these votes to link all the actions by the same user within a limited time frame and thus recover from these actions. All the users actions in other time frames, however, remain unlinkable. To protect the voting moderators from retaliation, we also propose a (less efficient) variant that allows moderators to vote anonymously. We implemented and evaluated both variants to show that they are practical. In particular, we believe this system is suitable to combat malicious Wikipedia editing.


privacy enhancing technologies | 2014

Forward-Secure Distributed Encryption

Wouter Lueks; Jaap-Henk Hoepman; Klaus Kursawe

Distributed encryption is a cryptographic primitive that implements revocable privacy. The primitive allows a recipient of a message to decrypt it only if enough senders encrypted that same message. We present a new distributed encryption scheme that is simpler than the previous solution by Hoepman and Galindo–in particular it does not rely on pairings–and that satisfies stronger security requirements. Moreover, we show how to achieve key evolution, which is necessary to ensure scalability in many practical applications, and prove that the resulting scheme is forward secure. Finally, we present a provably secure batched distributed encryption scheme that is much more efficient for small plaintext domains, but that requires more storage


Archive | 2014

Haalbaarheid van een anoniem misdaadmeldpunt via het Internet

Jaap-Henk Hoepman; Bert-Jaap Koops; Wouter Lueks


Nederlands Juristenblad | 2014

Anoniem misdaad melden via Internet: technische en juridische risico’s

Jaap-Henk Hoepman; Bert-Jaap Koops; Wouter Lueks

Collaboration


Dive into the Wouter Lueks's collaboration.

Top Co-Authors

Avatar

Jaap-Henk Hoepman

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Gergely Alpár

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pim Vullers

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Lejla Batina

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge