tim@ut:~$ sudo -u employee apt-get install phd [sudo] 👤 employee ⚿ tim@ut: (Reading database ... 99%█
I am working for the CRIPTIM project at the University of Twente in the Netherlands.
Critical infrastructure protection (CIP) mechanisms are commonly based on complex models of interdependencies between the many operators in our critical infrastructure. Particularly due to the rapid emergence of new cyber threats, the sharing of incident information is indispensable for the functioning of such mechanisms. However, the high sensitivity of this information prevents operators from sharing it.
CRIPTIM introduces the new paradigm ofcryptographic incident managementfor CIP that ensures data confidentiality with cryptographic guarantees, thereby reducing the operators' fears of information leakage. The underlying idea is to monitor and analyze incident data in the encrypted domain, while an alarm is set off only when a certain failure or alarm state is detected. The subsequent alarm resolution is facilitated through novel access control mechanisms for the selective disclosure of alarm-related information. CRIPTIM realizes this paradigm by developing novel custom-tailored cryptographic techniques in secure multi-party computation (MPC), homomorphic encryption (HE), and functional encryption (FE), as well as oblivious RAM (ORAM). The intended technology will, for the first time, allow external parties to feed threat-related confidential information into the monitoring system which may be the missing piece for the early detection of potentially major disasters.
CRIPTIM sets the foundations for this innovative approach to CIP and contributes to an effective and confidential incident management that leads to a more secure and reliable critical infrastructure.
The CRIPTIM project is funded by Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO).
- T. R. van de Kamp, D. Stritzl, W. Jonker, and A. Peter. “Two-Client and Multi-client Functional Encryption for Set Intersection.” In: ACISP ’19. (Christchurch, New Zealand, –). ISBN: 978-3-030-21547-7. DOI: 10.1007/978-3-030-21548-4_6. In press.
- T. R. van de Kamp, A. Peter, M. H. Everts, and W. Jonker. “Multi-client Predicate-Only Encryption for Conjunctive Equality Tests.” In: CANS ’17. (Hong Kong, China, –). Cham, Switzerland: Springer, 2018, pp. 135–157. ISBN: 978-3-030-02641-7. DOI: 10.1007/978-3-030-02641-7_7.
- [PDF] [presentation]
- T. R. van de Kamp, A. Peter, M. H. Everts, and W. Jonker. “Private Sharing of IOCs and Sightings.” In: WISCS ’16. (Vienna, Austria, ). New York, NY, USA: ACM, 2016, pp. 35–38. ISBN: 978-1-4503-4565-1. DOI: 10.1145/2994539.2994544.
- [PDF] [presentation] [Biblatex] [BibTeX]
It should be easy to extract my email addresses from the PGP keys.