Research
Technologies
A practical multy-party computation algorithm for a secure distributed online voting system
We developed an algorithm for online vote based on multy-party computation. Voters form small clusters of voters and then they make a partial vote all together. They sign the result, reporting they agree with that partial result and that they have already voted. The result is sent to an authority for making the final count of votes and controlling no double vote occurs.
A safe method to share data in the Cloud
We developed a protocol for sharing in the cloud data encrypted at origin. Instead of sending keys between users by another channel, the keys are stored under the control of two different authorities who need to cooperate to decrypt. If only one of these authorities acts honestly there is no way for the other one to get fraudulent access to the data.
Current Projects
Security and Privacy in Cloud Storage
We have developed a cloud service for which our customers don’t need to trust us to safeguard the privacy of their data. All data is encrypted and the custody of the keys belongs to our clients, not us. In contrast to the solution of other competitors, the users of the service don’t need to send keys by email to share access to data. Security and Privacy in Cloud Storage for IOT data.
Online Vote
Igloovote is a mix of the advantages of traditional voting systems and online voting systems. The main advantage of traditional voting systems is that security relies in multiple points of failure. If a polling place is compromised, only the votes of that polling place are compromised. Organizing an attack against all polling places is unthinkable (despite attacking only some of them still could have enormous consequences like in Florida 2000).
The main idea behind Igloovote is making distributed elections, with a lot of points of failure needed to compromise an election. Non-surprisingly Internet is a great tool for achieving that.
Data gathering for IOT.
The privacy of the data obtained from IoT devices can be a serious concern for final users of IoT services. Two strategies are possible to address the problem. The first one (the usual one) is based on legal agreements and strict security protocols to be followed by the personnel working with the data. The second strategy consists on using smart algorithms designed to provide anonymity by design. The first strategy is expensive and unreliable. We are seeing on the news how even big organizations implementing the most advanced security protocols and providing strong privacy agreements, fail to protect data affecting millions of users. We have developed some algorithms that let data collection to be safe and private, reducing the need for additional protocols and making possible to offer strict legal agreements at low cost, maximizing privacy and security.
Data gathering.
Data gathering for other online processes have the same problems than for IOT.
Future Projects
A cryptocurrency not based on blockchain
An automated census generation system
Interests
Applied Cryptography
Peer to peer systems
Multy-party computation
Network security
Join Us
Join us if you have similar interests and believe in our mission:
Developping the technology making possible to regulate privacy, free market, collective decission and identity in an effective, easy, cheap and safe way, making it possible to individuals to freely associate at a level that actually is only available to states.
Enjoy the secure cloud storage today   GET STARTED