Opendata, web and dolomites


Confidentiality-preserving Security Assurance

Total Cost €


EC-Contrib. €






 CASCAde project word cloud

Explore the words cloud of the CASCAde project. It provides you a very rough idea of what is the project "CASCAde" about.

changing    compelling    governments    six    primitives    trigger    transactions    paradigm    create    disclosing    signatures    usable    sensitive    essence    showed    shift    benefit    journey    signature    solution    invention    usability    hypothesis    certify    verifier    wps    maintaining    accepts    sense    earlier    participate    first    traced    cross    pursue    preliminary    time    graph    credential    trust    citizens    handle    preserving    assurance    obstacle    soundness    structures    critical    security    2015    creation    encodings    schemes    dependability    obstacles    cryptographic    back    investigates    proofs    blueprint    human    pursues    their    prove    integrity    hosts    generation    clears    architectures    techniques    foremost    dynamically    keeping    advantages    topologies    feasible    inter    translate    significantly    efficient    connected    prototypes    attribute    investigation    data    confidential    assuring    2008    anonymous    confidentiality   

Project "CASCAde" data sheet

The following table provides information about the project.


Organization address
address: KINGS GATE
postcode: NE1 7RU

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country United Kingdom [UK]
 Total cost 1˙485˙642 €
 EC max contribution 1˙485˙642 € (100%)
 Programme 1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
 Code Call ERC-2016-STG
 Funding Scheme ERC-STG
 Starting year 2017
 Duration (year-month-day) from 2017-11-01   to  2022-10-31


Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 


 Project objective

'This proposal aims to create a new generation of security assurance. It investigates whether one can certify an inter-connected dynamically changing system in such a way that one can prove its security properties without disclosing sensitive information about the system's blueprint.

This has several compelling advantages. First, the security of large-scale dynamically changing systems will be significantly improved. Second, we can prove properties of topologies, hosts and users who participate in transactions in one go, while keeping sensitive information confidential. Third, we can prove the integrity of graph data structures to others, while maintaining their their confidentiality. This will benefit EU governments and citizens through the increased security of critical systems.

The proposal pursues the main research hypothesis that usable confidentiality-preserving security assurance will trigger a paradigm shift in security and dependability. It will pursue this objective by the creation of new cryptographic techniques to certify and prove properties of graph data structures. A preliminary investigation in 2015 showed that graph signature schemes are indeed feasible. The essence of this solution can be traced back to my earlier research on highly efficient attribute encodings for anonymous credential schemes in 2008.

However, the invention of graph signature schemes only clears one obstacle in a long journey to create a new generation of security assurance systems. There are still many complex obstacles, first and foremost, assuring 'soundness' in the sense that integrity proofs a verifier accepts translate to the state of the system at that time. The work program involves six WPs: 1) to develop graph signatures and new cryptographic primitives; 2) to establish cross-system soundness; 3) to handle scale and change; 4) to establish human trust and usability; 5) to create new architectures; and 6) to test prototypes in practice.'


year authors and title journal last update
List of publications.
2019 Syh-Yuan Tan
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
published pages: 17045-17049, ISSN: 2169-3536, DOI: 10.1109/access.2019.2894289
IEEE Access 7 2019-07-03
2019 Thomas Gross
Fidelity of Statistical Reporting in 10 Years ofCyber Security User Studies
published pages: 1-35, ISSN: , DOI:
Newcastle University Tech Report TR-1529 2019-09-04
2019 Kovila Coopamootoo, Thomas Gross
A Systematic Evaluation of Evidence-Based Methods in Cyber Security User Studies
published pages: , ISSN: , DOI:
Newcastle University Tech Reports TR-1528 2019-07-03
2018 Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel
Investigation of 3-D Secure\'s Model for Fraud Detection
published pages: , ISSN: , DOI:
8th International Workshop on Socio-Technical Aspects in SecuriTy 2019-08-05
2019 Syh-Yuan Tan, Thomas Groß
A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding
published pages: , ISSN: , DOI:
Newcastle University Technical Reports TR-1527 2019-08-05

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CASCADE" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email ( and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CASCADE" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.1.)


The Enemy of the Good: Towards a Theory of Moral Progress

Read More  


The Mass Politics of Disintegration

Read More  

Photopharm (2020)

Photopharmacology: From Academia toward the Clinic.

Read More