NEXT
generation
techno-social and
Legal
Encryption
Access and
Privacy

In the wake of the Snowden revelations, public trust in the Internet has eroded.

NEXTLEAP aims to create, validate, and deploy communication and computation protocols that can serve as pillars for a secure, trust-worthy, annotable and privacy-respecting Internet that ensures citizens fundamental rights. For this purpose NEXTLEAP will develop an interdisciplinary internet science of decentralisation that provides the basis on which these protocols will be built.

Our events

UCL Carnival of Decentralization and Privacy
05.22.2017 - UCL

The UCL Information Security group is proud to host four distinguished lectures on the theme of anonymous communication, privacy and decentralization, as part of our involvement in the EU wide projects NEXTLEAP and PANORAMIX. The event is open to all, and free of charge.

FREE registration

10:15. Welcome. Presentation of the UCL Information Security Group & project.
Speaker: Prof. George Danezis (University College London)

10:15. “How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services”
Speaker: Prof. Claudia Diaz (KU Leuven)

11:45. "Optimal design of high-latency anonymous communications building blocks"
Speaker: Dr Carmela Troncoso (IMDEA Software Institute)

14:00. “XYZ: Anonymous Messaging via Secure Multiparty Computation Speaker”
Speaker: Prof. Aggelos Kiayias (University of Edinburgh & IOHK)

15:00. “ClaimChain: Public key infrastructure based on cross-referencing hash chains”
Speaker: Bogdan Kulynych (IMDEA Software Institute), and Marios Isaakidis (University College London)

16:00. Project presentations on decentralization & privacy

Decrypting Algorithms

Decentralized certification and blockchain systems
28.06.2017 15:00-18:00

Location:

more information

Future seminars

Past seminars

Projects

Autocrypt

As part of bringing privacy-preserving end-to-end encryption to decentralized messaging, researchers and implementers in NEXTLEAP have co-founded and are participating in the new Autocrypt effort. It aims to leverage the email ecosystem, the largest federated identity and messaging network, and bring encryption to a wider audience than other failed efforts in the last 15 years.

Claimchain

In order to be decentralized, secure messaging requires an ability to discover key material and guarantee its integrity. Typically, today this is done via a single centralized and unstandardised service provider. In order to create an interoperable standard around secure messaging, key discovery needs to be decentralized. Blockchain-based approaches have been suggested in previous work in the security research community such as CONIKS, but have failed to take off due to the high deployment cost on centralized servers. We've designed a new protocol, ClaimChain, that builds on both existing work on blockchains while adding new optimizations and providing a decentralized logic based on Rivest and Lampson's SDSI to identify and discovery key material without a trusted third party. Joint work with CNRS to understand the social and economic considerations led to a publication in Internet Science and the existing design will be submitted to a top-notch security conference. Currently, we are discussing early use of this design with codebases used by secure messaging and email providers, and a security and privacy analysis of these codbases was published in CANS. Over the next year we plan for all of these protocols to have formally verified code for their cryptographic functionality and to present a design on how to integrate this work on key discovery into secure messaging with improved privacy.

UnlimitID

UnlimitID is a method for enhancing the privacy of commodity OAuth and applications such as OpenID Connect, using anonymous attribute-based credentials based on algebrai Message Authentication Codes (aMACs). OAuth is one of the most widely used protocols on the Web, but it exposes each of the requests of a user for data by each relying party (RP) to the identity provider (IdP). Our approach allows for the creation of multiple persistent and unlinkable pseudo-identities and requires no change in the deployed code of relying parties, only in identity providers and the client.

Code

Repositories of various deliverables worked on by NEXTLEAP are available on GitHub: https://github.com/nextleap-project/

Why and how does it matter?

Francesca Musiani

Georges Danezis

Carmela Toncoso

Meet the NEXTLEAP team

NEXTLEAP combines expertise from across different disciplines in order to develop a set comprehensive answers to questions surrounding privacy and society. Our team is spread across Europe and includes specialists in computer science, formal protocol verification, sociology, social philosophy, cryptography and engineering.

NEXTLEAP Team group photo.
Holger Krekel, Georges Danezis, Bruno Blanchet, Francesca Musiani, Carmela Troncoso, Karthikeyan Bhargavan, Marios Isaakidis and Harry Halpin (not the entire team).

Future Events with NEXTLEAP Participation

Past Events with NEXTLEAP Participation

EuroUSec 2017 - 2nd European Workshop on Usable Security
Paris, UPMC, Paris 6, Sorbonne Universités / 29.04.2017

Rightscon
Brussels / 29-31.03.2017

CryptoAction Symposium
Amsterdam / 27-28.03.2017

Partners

INRIA IMDEA CNRS IRI (Centre Pompidou) UCL Merlinux