Martin Schanzenbach

Martin Schanzenbach
Fraunhofer Institute for Applied and Integrated Security | AISEC

Dr. rer. nat.

About

17
Publications
2,849
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
111
Citations
Introduction
Martin Schanzenbach currently works at Fraunhofer Institute for Applied and Integrated Security. Martin does research in Computer Communications (Networks), Computer Security and Reliability and Distributed Computing.

Publications

Publications (17)
Preprint
In this paper we present ZKlaims: a system that allows users to present attribute-based credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis of Succinct Non-interactive Arguments of Knowledge (SNARKs). ZKlaims allow users to prove statements on credentials issued by trusted third parties. The credential content...
Preprint
Full-text available
Identity and trust in the modern Internet are centralized around an oligopoly of identity service providers consisting solely of major tech companies. The problem with centralizing trust has become evident in recent discoveries of mass surveillance and censorship programs as well as information leakage through hacking incidents. One approach to dec...
Preprint
Full-text available
In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attri...
Article
Full-text available
The PARADISE project is in need of a solution for a very specific set of requirements regarding identity and access management (IAM), in particular for the identity and attribute delegation and the authentication of users and roles within the competitive sport setting. Additionally, athletes have to share whereabouts information with doping control...
Conference Paper
Today, user attributes are managed at centralized identity providers. However, two centralized identity providers dominate digital identity and access management on the web. This is increasingly becoming a privacy problem in times of mass surveillance and data mining for targeted advertisement. Existing systems for attribute sharing or credential p...
Conference Paper
The Domain Name System (DNS) is vital for access to information on the Internet. This makes it a target for attackers whose aim is to suppress free access to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decentralized and censorship-resistant name system. GNS provides a privacy-enhancing alte...
Conference Paper
Full-text available
The Domain Name System (DNS) is vital for access to infor-mation on the Internet. This makes it a target for attackers whose aim is to suppress free access to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decen-tralized and censorship-resistant name system. GNS provides a privacy-enhancing al...
Chapter
A central problem on the Internet today is that key infrastructure for security is concentrated in a few places. This is particularly true in the areas of naming and public key infrastructure. Secret services and other government organizations can use this fact to block access to information or monitor communications. One of the most popular and ea...
Conference Paper
Full-text available
A central problem on the Internet today is that key infras-tructure for security is concentrated in a few places. This is particularly true in the areas of naming and public key infrastructure. Secret services and other government organizations can use this fact to block access to information or monitor communications. One of the most popular and e...
Conference Paper
Full-text available
In mass casualty incidents a common operation picture, which gives an overview about the current situation is critical information for managing the emer-gency. In order to support the collaboration between different incident commanders a multi-touch table, placed in the incident command post, is used to present the current operation picture on a ma...
Conference Paper
Interaction with virtual maps is a common task on tabletop interfaces, particularly in the context of command-and-control applications. In nearly all cases, widely known gestures such as pinch-to-zoom are employed. To explore alternatives and variations of this mode of interaction, we have defined five alternative gesture sets for the tasks of modi...
Technical Report
Full-text available
Interaction with virtual maps is a common task on table- top interfaces, particularly in the context of command-and- control applications. In nearly all cases, widely known ges- tures such as pinch-to-zoom are employed. To explore alter- natives and variations of this mode of interaction, we have defined five alternative gesture sets for the tasks...

Network

Cited By

Projects

Project (1)