Skip to main content

CyberLINKS

Cybersecurity Research Group at LINKS Foundation

Lines of Research​

Trusted Computing

A set of interoperable HW and SW technologies for building trust in the behaviour of embedded devices. The core elements are an HW Root of Trust (RoT) called Trusted Platform Module (TPM) and/or a Trusted Execution Environment (TEE).

Self-Sovereign Identity

A decentralised identity model for embedded devices based on three fundamental elements: Distributed Ledger Technology (DLT) as the Root of Trust (RoT) for public identity data, Decentralised IDentifier (DID), and Verifiable Credential (VC) as the key components of the identity.

Cryptography

Cryptographic key management, Zero-Knowledge Proof (ZKP) techniques applied to SSI, and the transition of Internet protocols and decentralised identity frameworks to Post-Quantum Cryptography (PQC).

Distributed Ledgers and Smart Contracts

Building blocks for developing connected, decentralized, secure and self-organizing (embedded) systems.

Images by vectorjuice from Freepik