Explore the words cloud of the PANORAMIX project. It provides you a very rough idea of what is the project "PANORAMIX" about.
The following table provides information about the project.
Coordinator |
THE UNIVERSITY OF EDINBURGH
Organization address contact info |
Coordinator Country | United Kingdom [UK] |
Project website | https://panoramix-project.eu |
Total cost | 4˙459˙711 € |
EC max contribution | 3˙796˙625 € (85%) |
Programme |
1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens) |
Code Call | H2020-DS-2014-1 |
Funding Scheme | IA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-09-01 to 2019-01-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | THE UNIVERSITY OF EDINBURGH | UK (EDINBURGH) | coordinator | 513˙948.00 |
2 | UNIVERSITY COLLEGE LONDON | UK (LONDON) | participant | 519˙862.00 |
3 | GREENHOST | NL (AMSTERDAM) | participant | 502˙950.00 |
4 | NATIONAL INFRASTRUCTURES FOR RESEARCH AND TECHNNOLOGY | EL (ATHINA) | participant | 466˙112.00 |
5 | KATHOLIEKE UNIVERSITEIT LEUVEN | BE (LEUVEN) | participant | 450˙000.00 |
6 | TARTU ULIKOOL | EE (TARTU) | participant | 392˙175.00 |
7 | SAP SE | DE (WALLDORF) | participant | 389˙200.00 |
8 | CENTER FOR THE CULTIVATION OF TECHNOLOGY GEMEINNUTZIGE GMBH | DE (BERLIN) | participant | 307˙250.00 |
9 | ETHNIKO KAI KAPODISTRIAKO PANEPISTIMIO ATHINON | EL (ATHINA) | participant | 202˙000.00 |
10 | VIKINGCO | BE (HASSELT) | participant | 53˙127.00 |
'The objective of the PANORAMIX project is the development of a multipurpose infrastructure for privacy-preserving communications based on 'mix-networks' (mix-nets) and its integration into high-value applications that can be exploited by European businesses. Mix-nets protect not only the content of communications from third parties, but also obscure the exact identity of the senders or receivers of messages, through the use of cryptographic relays. Mix-nets are absolutely necessary for implementing strong privacy-preserving systems and protocols. This project directly aims to realize, integrate and demonstrate the use of a European infrastructure for mix-nets in the context of three diverse high-value applications that have clear, measurable, realistic, and achievable objectives. Our objectives are as follows. (Objective 1): Building a Mix-Net Infrastructure for Europe, by creating a European mix-network open-source codebase and infrastructure, (Objective 2): apply our infrastructure to private electronic voting protocols, where anonymity is necessary to guarantee ballot secrecy, and verifiability is needed for holding fair, transparent and trustworthy elections; (Objective 3): apply our infrastructure to privacy-aware cloud data-handling, in the context of privacy-friendly surveying, statistics and big data gathering protocols, where protecting the identity of the surveyed users is necessary to elicit truthful answers and incentivize participation; (Objective 4): apply our infrastructure to privacy-preserving messaging, where two or more users may communicate privately without third parties being able to track what is said or who-is-talking-to-whom. PANORAMIX facilitates a genuine collaboration between academia, civil society and industry bringing together a team of researchers from academia with a proven track record on privacy technologies and industry in domains where privacy technologies can have a very high impact.'
Analysis of User Feedback | Documents, reports | 2019-11-28 15:56:17 |
Final Review and Assessment | Documents, reports | 2019-11-28 15:56:17 |
Y1 Review and Assessment | Documents, reports | 2019-11-28 15:56:14 |
Initial Requirements, Design, and Prototype | Documents, reports | 2019-11-28 15:56:14 |
Minimum Viable Product | Demonstrators, pilots, prototypes | 2019-11-28 15:56:14 |
Minimum Viable Product (MVP) | Documents, reports | 2019-11-28 15:56:14 |
Applying Mix Nets to Email Document | Documents, reports | 2019-11-28 15:56:14 |
Modelling, Design and Analysis:Interim report | Documents, reports | 2019-11-28 15:56:14 |
Survey/Statistics: Interim report | Documents, reports | 2019-11-28 15:56:14 |
Initial report | Documents, reports | 2019-11-28 15:56:14 |
Preliminary Exploitation Plan | Documents, reports | 2019-11-28 15:56:14 |
Requirements and User Interface Design | Documents, reports | 2019-11-28 15:56:14 |
Dissemination Report I | Documents, reports | 2019-11-28 15:56:15 |
Complete Exploitation Plan | Documents, reports | 2019-11-28 15:56:14 |
Y2 Review and Assessment | Documents, reports | 2019-11-28 15:56:14 |
Dissemination Plan | Documents, reports | 2019-11-28 15:56:14 |
Public Web Page and Blog | Websites, patent fillings, videos etc. | 2019-11-28 15:56:15 |
Ethics report | Documents, reports | 2019-11-28 15:56:14 |
Dissemination Report II | Documents, reports | 2019-11-28 15:56:15 |
Open-source code of integrated system for desktops | Other | 2019-11-28 15:56:14 |
Integrated System | Documents, reports | 2019-11-28 15:56:13 |
Final Service | Other | 2019-11-28 15:56:14 |
Dissemination Report III | Documents, reports | 2019-11-28 15:56:13 |
Integrated Service | Other | 2019-11-28 15:56:14 |
Standardisation Report | Documents, reports | 2019-11-28 15:56:13 |
Scientific Advisory Board Reports | Documents, reports | 2019-11-28 15:56:13 |
Report on Exploitation Activities and Updated Plan for Further Exploitation | Documents, reports | 2019-11-28 15:56:13 |
Final System | Documents, reports | 2019-11-28 15:56:13 |
Final report | Documents, reports | 2019-11-28 15:56:13 |
Final report validation & testing | Documents, reports | 2019-11-28 15:56:14 |
Take a look to the deliverables list in detail: detailed list of PANORAMIX deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2017 |
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Ceremonies for End-to-End Verifiable Elections published pages: 305-334, ISSN: , DOI: 10.1007/978-3-662-54388-7_11 |
Public-Key Cryptography – PKC 2017 | 2019-11-28 |
2017 |
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang An Efficient E2E Verifiable E-voting System without Setup Assumptions published pages: 14-23, ISSN: 1540-7993, DOI: 10.1109/MSP.2017.71 |
IEEE Security & Privacy 15/3 | 2019-11-28 |
2016 |
Jamie Hayes and George Danezis k-fingerprinting: a Robust Scalable Website Fingerprinting Technique published pages: 1187--1203, ISSN: , DOI: |
25th USENIX Security Symposium 2016 | 2019-11-28 |
2017 |
Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis The Loopix Anonymity System published pages: , ISSN: , DOI: |
USENIX Security Symposium 2017 | 2019-11-28 |
2016 |
Raphael R. Toledo, George Danezis, Ian Goldberg Lower-Cost epsilon-Private Information Retrieval published pages: 184–201, ISSN: 2299-0984, DOI: |
Proceedings on Privacy Enhancing Technologies Volume 4, 2016 | 2019-11-28 |
2017 |
Giovanni Cherubin, Jamie Hayes, Marc Juarez Website Fingerprinting Defenses at the Application Layer published pages: , ISSN: 2299-0984, DOI: 10.1515/popets-2017-0023 |
Proceedings on Privacy Enhancing Technologies 2017/2 | 2019-11-28 |
2017 |
Juan Garay, Aggelos Kiayias, Nikos Leonardos The Bitcoin Backbone Protocol with Chains of Variable Difficulty published pages: 291-323, ISSN: , DOI: 10.1007/978-3-319-63688-7_10 |
Advances in Cryptology – CRYPTO 2017 | 2019-11-28 |
2016 |
Prastudy Fauzi, Helger Lipmaa and Michał Zając. A Shuffle Argument Secure in the Generic Model published pages: , ISSN: , DOI: |
Advances in Cryptology - ASIACRYPT 2016 | 2019-11-28 |
2016 |
Helger Lipmaa Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs published pages: 185-206, ISSN: , DOI: |
Progress in Cryptology - AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa | 2019-11-28 |
2016 |
Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis Blockchain Mining Games published pages: 365-382, ISSN: , DOI: |
Proceedings of the 2016 ACM Conference on Economics and Computation | 2019-11-28 |
2015 |
Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig HORNET: High-speed Onion Routing at the Network Layer published pages: 1441-1454, ISSN: , DOI: |
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA | 2019-11-28 |
2017 |
Jonas Böhler, Daniel Bernau, Florian Kerschbaum Privacy-Preserving Outlier Detection for Data Streams published pages: 225-238, ISSN: , DOI: 10.1007/978-3-319-61176-1_12 |
Data and Applications Security and Privacy XXXI. DBSec 2017 | 2019-11-28 |
2016 |
Luca Melis, George Danezis and Emiliano De Cristofaro Efficient Private Statistics with Succinct Sketches published pages: , ISSN: , DOI: |
23nd Annual Network and Distributed System Security Symposium, NDSS, 2016 | 2019-11-28 |
2017 |
Fabrice Benhamouda, Florian Bourse, Helger Lipmaa CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions published pages: 36-66, ISSN: , DOI: 10.1007/978-3-662-54388-7_2 |
Public-Key Cryptography – PKC 2017 | 2019-11-28 |
2017 |
Helger Lipmaa and Kateryna Pavly A Simpler Rate-Optimal CPIR Protocol. published pages: , ISSN: , DOI: |
21st International Conference on Financial Cryptography and Data Security 2017 | 2019-11-28 |
2017 |
Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. published pages: 357-388, ISSN: , DOI: 10.1007/978-3-319-63688-7_12 |
Advances in Cryptology – CRYPTO 2017 | 2019-11-28 |
2016 |
Florian Kerschbaum, Mathias Kohler, Florian Hahn and Daniel Bernau AWARE: Anonymization With guARanteEd privacy published pages: , ISSN: , DOI: |
2019-11-28 | |
2016 |
Tariq Elahi, Joan A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg A Framework for the Game-theoretic Analysis of Censorship Resistance published pages: 83-101, ISSN: 2299-0984, DOI: |
Proceedings on Privacy Enhancing Technologies volume 4, 2016 | 2019-11-28 |
2016 |
Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) published pages: 276-291, ISSN: , DOI: |
IEEE European Symposium on Security and Privacy | 2019-11-28 |
2017 |
Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Auditing for privacy in threshold PKE e-voting published pages: 100-116, ISSN: 2056-4961, DOI: 10.1108/ics-07-2016-0056 |
Information and Computer Security 25/1 | 2019-11-28 |
2015 |
Harry Halpin, Patrick J. Hayes, and Henry S.Thompson When owl:sameAs isn\'t the Same Redux: Towards a Theory of Identity, Context, and Inference on the Semantic Web published pages: 47-60, ISSN: , DOI: |
Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015 | 2019-11-28 |
2016 |
Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, and Claudia
Diaz A survey on routing in anonymous communication protocols published pages: , ISSN: , DOI: |
2019-11-28 | |
2017 |
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias MCMix: Anonymous Messaging via Secure Multiparty Computation published pages: , ISSN: , DOI: |
USENIX Security Symposium 201 | 2019-11-28 |
2017 |
Helger Lipmaa Optimally Sound Sigma Protocols Under DCRA published pages: , ISSN: , DOI: |
21st International Conference on Financial Cryptography and Data Security 2017 | 2019-11-28 |
2017 |
Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna On the Privacy and Security of the Ultrasound Ecosystem published pages: , ISSN: 2299-0984, DOI: 10.1515/popets-2017-0018 |
Proceedings on Privacy Enhancing Technologies 2017/2 | 2019-11-28 |
2016 |
Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang Indistinguishable Proofs of Work or Knowledge published pages: 902-933, ISSN: , DOI: 10.1007/978-3-662-53890-6_30 |
Advances in Cryptology – ASIACRYPT 2016 | 2019-11-28 |
2016 |
Prastudy Fauzi and Helger Lipmaa Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles published pages: 200-216, ISSN: , DOI: |
Topics in Cryptology - CT-RSA 2016: The Cryptographers\' Track at the RSA Conference 2016 | 2019-11-28 |
2016 |
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright Toward an Efficient Website Fingerprinting Defense published pages: 27-46, ISSN: , DOI: 10.1007/978-3-319-45744-4_2 |
Computer Security – ESORICS 2016 | 2019-11-28 |
2016 |
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Systems published pages: 37-61, ISSN: 2299-0984, DOI: |
Proceedings on Privacy Enhancing Technologies Volume 4, 2016 | 2019-11-28 |
2016 |
Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang Efficient Encrypted Keyword Search for Multi-user Data Sharing published pages: 173-195, ISSN: , DOI: 10.1007/978-3-319-45744-4_9 |
Computer Security – ESORICS 2016 | 2019-11-28 |
2018 |
Mavroudis, Vasilios; Veale, Michael Eavesdropping Whilst You\'re Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces published pages: , ISSN: , DOI: 10.31228/OSF.IO/8QN9F |
In: Proceedings of Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET: London, UK. (2018) 1 | 2019-11-28 |
2018 |
Hicks, Alexander; Mavroudis, Vasilios; Al-Bassam, Mustafa; Meiklejohn, Sarah; Murdoch, Steven J. VAMS: Verifiable Auditing of Access to Confidential Data published pages: , ISSN: , DOI: |
1 | 2019-11-28 |
2017 |
Piotrowska, A. M.; Hayes, J.; Gelernter, N.; Danezis, G.; Herzberg, A. AnNotify: A Private Notification Service published pages: , ISSN: , DOI: |
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES \'17). (pp. pp. 5-15). Association for Computing Machinery (ACM): New York, NY, USA. (2017) 1 | 2019-11-28 |
2018 |
Overdorf, Rebekah; Kulynych, Bogdan; Balsa, Ero; Troncoso, Carmela; Gürses, Seda POTs: Protective Optimization Technologies published pages: , ISSN: , DOI: |
1 | 2019-11-28 |
2017 |
Toledo, R. R.; Danezis, G. D.; Echizen, I. E. Mix-ORAM: Using Delegated Shuffles published pages: , ISSN: , DOI: |
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society. (pp. pp. 51-61). ACM: New York, USA. (2017) 1 | 2019-11-28 |
2017 |
Mavroudis, V.; Cerulli, A.; Svenda, P.; Cvrcek, D.; Klinec, D.; Danezis, G. A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components published pages: , ISSN: , DOI: |
In: Evans, D and Malkin, T and Xu, D, (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1583-1600). ACM: New York, USA. (2017) 1 | 2019-11-28 |
2018 |
Weggenmann, Benjamin; Kerschbaum, Florian SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining published pages: , ISSN: , DOI: |
1 | 2019-11-28 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "PANORAMIX" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "PANORAMIX" are provided by the European Opendata Portal: CORDIS opendata.