Thomas Lorünser
YOU?
Author Swipe
View article: Towards Privacy-Preserving Machine Learning for Energy Prediction in Industrial Robotics: Modeling, Evaluation and Integration
Towards Privacy-Preserving Machine Learning for Energy Prediction in Industrial Robotics: Modeling, Evaluation and Integration Open
This paper explores the feasibility and implications of developing a privacy-preserving, data-driven cloud service for predicting the energy consumption of industrial robots. Using machine learning, we evaluated three neural network archit…
View article: Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer Open
Commitment schemes (CSs) are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols. …
View article: Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer
Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer Open
Commitment schemes are essential to many cryptographic protocols and schemes with applications that include privacy-preserving computation on data, privacy-preserving authentication, and, in particular, oblivious transfer protocols. For qu…
View article: Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer
Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer Open
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT) on an entanglement-based physical layer. The QOT protocol uses polarization-encoded entangled states to share …
View article: Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers
Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers Open
The federated analysis of sensitive time series has huge potential in various domains, such as healthcare or manufacturing. Yet, to fully unlock this potential, requirements imposed by various stakeholders must be fulfilled, regarding, e.g…
View article: On the Security of Offloading Post-Processing for Quantum Key Distribution
On the Security of Offloading Post-Processing for Quantum Key Distribution Open
Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging because of the very particular nature of Q…
View article: Single-Use Delegatable Signatures Based on Smart Contracts
Single-Use Delegatable Signatures Based on Smart Contracts Open
Delegation of cryptographic signing rights has found many application in the\nliterature and the real world. However, despite very advanced functionalities\nand specific use cases, existing solutions share the natural limitation that\nthe …
View article: Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services
Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services Open
Byzantine fault-tolerant systems have been researched for more than four decades, and although shown possible early, the solutions were impractical for a long time. With PBFT the first practical solution was proposed in 1999 and spawned ne…
View article: Making secret sharing based cloud storage usable
Making secret sharing based cloud storage usable Open
Purpose The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. S…
View article: The Archistar Secret-Sharing Backup Proxy
The Archistar Secret-Sharing Backup Proxy Open
Cloud-Storage has become part of the standard toolkit for enterprise-grade computing. While being cost- and energy-efficient, cloud storage's availability and data confidentiality can be problematic. A common approach of mitigating those i…
View article: Cloud technology options towards Free Flow of Data
Cloud technology options towards Free Flow of Data Open
This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document descri…