Opendata, web and dolomites

PANORAMIX

Privacy and Accountability in Networks via Optimized Randomized Mix-nets

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "PANORAMIX" data sheet

The following table provides information about the project.

Coordinator
THE UNIVERSITY OF EDINBURGH 

Organization address
address: OLD COLLEGE, SOUTH BRIDGE
city: EDINBURGH
postcode: EH8 9YL
website: www.ed.ac.uk

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country United Kingdom [UK]
 Project website https://panoramix-project.eu
 Total cost 4˙459˙711 €
 EC max contribution 3˙796˙625 € (85%)
 Programme 1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens)
 Code Call H2020-DS-2014-1
 Funding Scheme IA
 Starting year 2015
 Duration (year-month-day) from 2015-09-01   to  2019-01-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    THE UNIVERSITY OF EDINBURGH UK (EDINBURGH) coordinator 513˙948.00
2    UNIVERSITY COLLEGE LONDON UK (LONDON) participant 519˙862.00
3    GREENHOST NL (AMSTERDAM) participant 502˙950.00
4    NATIONAL INFRASTRUCTURES FOR RESEARCH AND TECHNNOLOGY EL (ATHINA) participant 466˙112.00
5    KATHOLIEKE UNIVERSITEIT LEUVEN BE (LEUVEN) participant 450˙000.00
6    TARTU ULIKOOL EE (TARTU) participant 392˙175.00
7    SAP SE DE (WALLDORF) participant 389˙200.00
8    CENTER FOR THE CULTIVATION OF TECHNOLOGY GEMEINNUTZIGE GMBH DE (BERLIN) participant 307˙250.00
9    ETHNIKO KAI KAPODISTRIAKO PANEPISTIMIO ATHINON EL (ATHINA) participant 202˙000.00
10    VIKINGCO BE (HASSELT) participant 53˙127.00

Map

 Project objective

'The objective of the PANORAMIX project is the development of a multipurpose infrastructure for privacy-preserving communications based on 'mix-networks' (mix-nets) and its integration into high-value applications that can be exploited by European businesses. Mix-nets protect not only the content of communications from third parties, but also obscure the exact identity of the senders or receivers of messages, through the use of cryptographic relays. Mix-nets are absolutely necessary for implementing strong privacy-preserving systems and protocols. This project directly aims to realize, integrate and demonstrate the use of a European infrastructure for mix-nets in the context of three diverse high-value applications that have clear, measurable, realistic, and achievable objectives. Our objectives are as follows. (Objective 1): Building a Mix-Net Infrastructure for Europe, by creating a European mix-network open-source codebase and infrastructure, (Objective 2): apply our infrastructure to private electronic voting protocols, where anonymity is necessary to guarantee ballot secrecy, and verifiability is needed for holding fair, transparent and trustworthy elections; (Objective 3): apply our infrastructure to privacy-aware cloud data-handling, in the context of privacy-friendly surveying, statistics and big data gathering protocols, where protecting the identity of the surveyed users is necessary to elicit truthful answers and incentivize participation; (Objective 4): apply our infrastructure to privacy-preserving messaging, where two or more users may communicate privately without third parties being able to track what is said or who-is-talking-to-whom. PANORAMIX facilitates a genuine collaboration between academia, civil society and industry bringing together a team of researchers from academia with a proven track record on privacy technologies and industry in domains where privacy technologies can have a very high impact.'

 Deliverables

List of deliverables.
Analysis of User Feedback Documents, reports 2019-11-28 15:56:17
Final Review and Assessment Documents, reports 2019-11-28 15:56:17
Y1 Review and Assessment Documents, reports 2019-11-28 15:56:14
Initial Requirements, Design, and Prototype Documents, reports 2019-11-28 15:56:14
Minimum Viable Product Demonstrators, pilots, prototypes 2019-11-28 15:56:14
Minimum Viable Product (MVP) Documents, reports 2019-11-28 15:56:14
Applying Mix Nets to Email Document Documents, reports 2019-11-28 15:56:14
Modelling, Design and Analysis:Interim report Documents, reports 2019-11-28 15:56:14
Survey/Statistics: Interim report Documents, reports 2019-11-28 15:56:14
Initial report Documents, reports 2019-11-28 15:56:14
Preliminary Exploitation Plan Documents, reports 2019-11-28 15:56:14
Requirements and User Interface Design Documents, reports 2019-11-28 15:56:14
Dissemination Report I Documents, reports 2019-11-28 15:56:15
Complete Exploitation Plan Documents, reports 2019-11-28 15:56:14
Y2 Review and Assessment Documents, reports 2019-11-28 15:56:14
Dissemination Plan Documents, reports 2019-11-28 15:56:14
Public Web Page and Blog Websites, patent fillings, videos etc. 2019-11-28 15:56:15
Ethics report Documents, reports 2019-11-28 15:56:14
Dissemination Report II Documents, reports 2019-11-28 15:56:15
Open-source code of integrated system for desktops Other 2019-11-28 15:56:14
Integrated System Documents, reports 2019-11-28 15:56:13
Final Service Other 2019-11-28 15:56:14
Dissemination Report III Documents, reports 2019-11-28 15:56:13
Integrated Service Other 2019-11-28 15:56:14
Standardisation Report Documents, reports 2019-11-28 15:56:13
Scientific Advisory Board Reports Documents, reports 2019-11-28 15:56:13
Report on Exploitation Activities and Updated Plan for Further Exploitation Documents, reports 2019-11-28 15:56:13
Final System Documents, reports 2019-11-28 15:56:13
Final report Documents, reports 2019-11-28 15:56:13
Final report validation & testing Documents, reports 2019-11-28 15:56:14

Take a look to the deliverables list in detail:  detailed list of PANORAMIX deliverables.

 Publications

year authors and title journal last update
List of publications.
2017 Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Ceremonies for End-to-End Verifiable Elections
published pages: 305-334, ISSN: , DOI: 10.1007/978-3-662-54388-7_11
Public-Key Cryptography – PKC 2017 2019-11-28
2017 Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
An Efficient E2E Verifiable E-voting System without Setup Assumptions
published pages: 14-23, ISSN: 1540-7993, DOI: 10.1109/MSP.2017.71
IEEE Security & Privacy 15/3 2019-11-28
2016 Jamie Hayes and George Danezis
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
published pages: 1187--1203, ISSN: , DOI:
25th USENIX Security Symposium 2016 2019-11-28
2017 Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis
The Loopix Anonymity System
published pages: , ISSN: , DOI:
USENIX Security Symposium 2017 2019-11-28
2016 Raphael R. Toledo, George Danezis, Ian Goldberg
Lower-Cost epsilon-Private Information Retrieval
published pages: 184–201, ISSN: 2299-0984, DOI:
Proceedings on Privacy Enhancing Technologies Volume 4, 2016 2019-11-28
2017 Giovanni Cherubin, Jamie Hayes, Marc Juarez
Website Fingerprinting Defenses at the Application Layer
published pages: , ISSN: 2299-0984, DOI: 10.1515/popets-2017-0023
Proceedings on Privacy Enhancing Technologies 2017/2 2019-11-28
2017 Juan Garay, Aggelos Kiayias, Nikos Leonardos
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
published pages: 291-323, ISSN: , DOI: 10.1007/978-3-319-63688-7_10
Advances in Cryptology – CRYPTO 2017 2019-11-28
2016 Prastudy Fauzi, Helger Lipmaa and Michał Zając.
A Shuffle Argument Secure in the Generic Model
published pages: , ISSN: , DOI:
Advances in Cryptology - ASIACRYPT 2016 2019-11-28
2016 Helger Lipmaa
Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs
published pages: 185-206, ISSN: , DOI:
Progress in Cryptology - AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa 2019-11-28
2016 Aggelos Kiayias, Elias Koutsoupias, Maria Kyropoulou, Yiannis Tselekounis
Blockchain Mining Games
published pages: 365-382, ISSN: , DOI:
Proceedings of the 2016 ACM Conference on Economics and Computation 2019-11-28
2015 Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig
HORNET: High-speed Onion Routing at the Network Layer
published pages: 1441-1454, ISSN: , DOI:
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA 2019-11-28
2017 Jonas Böhler, Daniel Bernau, Florian Kerschbaum
Privacy-Preserving Outlier Detection for Data Streams
published pages: 225-238, ISSN: , DOI: 10.1007/978-3-319-61176-1_12
Data and Applications Security and Privacy XXXI. DBSec 2017 2019-11-28
2016 Luca Melis, George Danezis and Emiliano De Cristofaro
Efficient Private Statistics with Succinct Sketches
published pages: , ISSN: , DOI:
23nd Annual Network and Distributed System Security Symposium, NDSS, 2016 2019-11-28
2017 Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
published pages: 36-66, ISSN: , DOI: 10.1007/978-3-662-54388-7_2
Public-Key Cryptography – PKC 2017 2019-11-28
2017 Helger Lipmaa and Kateryna Pavly
A Simpler Rate-Optimal CPIR Protocol.
published pages: , ISSN: , DOI:
21st International Conference on Financial Cryptography and Data Security 2017 2019-11-28
2017 Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol.
published pages: 357-388, ISSN: , DOI: 10.1007/978-3-319-63688-7_12
Advances in Cryptology – CRYPTO 2017 2019-11-28
2016 Florian Kerschbaum, Mathias Kohler, Florian Hahn and Daniel Bernau
AWARE: Anonymization With guARanteEd privacy
published pages: , ISSN: , DOI:
2019-11-28
2016 Tariq Elahi, Joan A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg
A Framework for the Game-theoretic Analysis of Censorship Resistance
published pages: 83-101, ISSN: 2299-0984, DOI:
Proceedings on Privacy Enhancing Technologies volume 4, 2016 2019-11-28
2016 Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk and Jiayu Xu
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
published pages: 276-291, ISSN: , DOI:
IEEE European Symposium on Security and Privacy 2019-11-28
2017 Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Auditing for privacy in threshold PKE e-voting
published pages: 100-116, ISSN: 2056-4961, DOI: 10.1108/ics-07-2016-0056
Information and Computer Security 25/1 2019-11-28
2015 Harry Halpin, Patrick J. Hayes, and Henry S.Thompson
When owl:sameAs isn\'t the Same Redux: Towards a Theory of Identity, Context, and Inference on the Semantic Web
published pages: 47-60, ISSN: , DOI:
Modeling and Using Context: 9th International and Interdisciplinary Conference, CONTEXT 2015 2019-11-28
2016 Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, and Claudia Diaz
A survey on routing in anonymous communication protocols
published pages: , ISSN: , DOI:
2019-11-28
2017 Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
MCMix: Anonymous Messaging via Secure Multiparty Computation
published pages: , ISSN: , DOI:
USENIX Security Symposium 201 2019-11-28
2017 Helger Lipmaa
Optimally Sound Sigma Protocols Under DCRA
published pages: , ISSN: , DOI:
21st International Conference on Financial Cryptography and Data Security 2017 2019-11-28
2017 Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, Giovanni Vigna
On the Privacy and Security of the Ultrasound Ecosystem
published pages: , ISSN: 2299-0984, DOI: 10.1515/popets-2017-0018
Proceedings on Privacy Enhancing Technologies 2017/2 2019-11-28
2016 Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
Indistinguishable Proofs of Work or Knowledge
published pages: 902-933, ISSN: , DOI: 10.1007/978-3-662-53890-6_30
Advances in Cryptology – ASIACRYPT 2016 2019-11-28
2016 Prastudy Fauzi and Helger Lipmaa
Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles
published pages: 200-216, ISSN: , DOI:
Topics in Cryptology - CT-RSA 2016: The Cryptographers\' Track at the RSA Conference 2016 2019-11-28
2016 Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Toward an Efficient Website Fingerprinting Defense
published pages: 27-46, ISSN: , DOI: 10.1007/978-3-319-45744-4_2
Computer Security – ESORICS 2016 2019-11-28
2016 Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg
SoK: Making Sense of Censorship Resistance Systems
published pages: 37-61, ISSN: 2299-0984, DOI:
Proceedings on Privacy Enhancing Technologies Volume 4, 2016 2019-11-28
2016 Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
Efficient Encrypted Keyword Search for Multi-user Data Sharing
published pages: 173-195, ISSN: , DOI: 10.1007/978-3-319-45744-4_9
Computer Security – ESORICS 2016 2019-11-28
2018 Mavroudis, Vasilios; Veale, Michael
Eavesdropping Whilst You\'re Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces
published pages: , ISSN: , DOI: 10.31228/OSF.IO/8QN9F
In: Proceedings of Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET: London, UK. (2018) 1 2019-11-28
2018 Hicks, Alexander; Mavroudis, Vasilios; Al-Bassam, Mustafa; Meiklejohn, Sarah; Murdoch, Steven J.
VAMS: Verifiable Auditing of Access to Confidential Data
published pages: , ISSN: , DOI:
1 2019-11-28
2017 Piotrowska, A. M.; Hayes, J.; Gelernter, N.; Danezis, G.; Herzberg, A.
AnNotify: A Private Notification Service
published pages: , ISSN: , DOI:
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society (WPES \'17). (pp. pp. 5-15). Association for Computing Machinery (ACM): New York, NY, USA. (2017) 1 2019-11-28
2018 Overdorf, Rebekah; Kulynych, Bogdan; Balsa, Ero; Troncoso, Carmela; Gürses, Seda
POTs: Protective Optimization Technologies
published pages: , ISSN: , DOI:
1 2019-11-28
2017 Toledo, R. R.; Danezis, G. D.; Echizen, I. E.
Mix-ORAM: Using Delegated Shuffles
published pages: , ISSN: , DOI:
In: Thuraisingham, B and Lee, AJ, (eds.) Proceedings of the 2017 Workshop on Privacy in the Electronic Society. (pp. pp. 51-61). ACM: New York, USA. (2017) 1 2019-11-28
2017 Mavroudis, V.; Cerulli, A.; Svenda, P.; Cvrcek, D.; Klinec, D.; Danezis, G.
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
published pages: , ISSN: , DOI:
In: Evans, D and Malkin, T and Xu, D, (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (pp. pp. 1583-1600). ACM: New York, USA. (2017) 1 2019-11-28
2018 Weggenmann, Benjamin; Kerschbaum, Florian
SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining
published pages: , ISSN: , DOI:
1 2019-11-28

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "PANORAMIX" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "PANORAMIX" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.)

IECEU (2015)

Improving the Effectiveness of the Capabilities (IEC) in EU conflict prevention

Read More  

SEREN 3 (2015)

Security Research NCP Network 3

Read More  

EMYNOS (2015)

nExt generation eMergencY commuNicatiOnS

Read More