Welcome to

IANZN

Custom Software, Internet Security, and More...

Services

What we offer

Research

We investigate new forms of compliance, confidentiality, compression, integrity, and credibility of digital data and computations by exploring zero-knowledge proof technology via our research papers.

Development

We develop protocols and solutions for data security, privacy, and control (e.g. ianzn identity). We publicly expose proofs of concepts and tooling to improve the integration and maintenance of novel cryptographic concepts.

Education

We educate security and privacy concepts of research papers and tooling via extended blog articles written in less-technical jargon. Our educative resources rely on step-by-step walkthroughs and enable cross-platform reproduction.

Consulting

Based on your problem definition and software stack, we assess if and how cryptographic technologies solve your compliance and provenance requirements. If our work catches your interest, please contact us.

Profiles

Who we are


Portfolio

Latest works


gnark_lib Repo

Zero-knowledge circuit library for the gnark framework (e.g. dynamic AES128 in GCM mode with Plonk lookups). Includes ZKP verification at Ethereum smart contracts.

janus_artifacts Repo

MPC, FHE, and ZKP building blocks for efficient verification of data provenance.

PhD Thesis Paper

Advancing Privacy-Enhancing Technologies for Policy-Driven Data Sovereignty and Provenance

ZK101 @TUM Blockchain Conference Talk

The Magic of Proving Without Revealing

2024 TUM Blockchain Salon Talk

Transpiling Policies to Secure Computation Circuits

Portal Paper

Portal: Time-Bound and Replay-Resistant Zero-Knowledge Proofs for Single Sign-On @ZKDAPPS24

zkGen Paper

zkGen: Policy-to-Circuit Transpiler @ICBC24

web3knowledge Repo

A collection of links, research papers, tools, researchers, events, ... every web3 follower should know.

SoK Paper

SoK: Data Sovereignty

First Blog Blog

Hello World blog introducing IANZN

Janus Paper

Janus: Fast Privacy-Preserving Data Provenance For TLS

Origo Paper

ORIGO: Proving Provenance of Sensitive Data with Constant Communication

Secure 2PC Talk

Introduction talk to secure two-party computation

Data Provenance Talk

Introduction talk to verifiable provenance of web data

DrLauinger.de Website

Website of doctor's office

Hypothesis Talk

Scientific Hypothesis Modeling

A-PoA Paper

A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management @ICBC24

Masters Thesis Paper

Runtime System Adaptation in Web of Things

Research Internship Paper

Evaluating Client Discrimination in Anonymization Networks Using Active Network Scans

Bachelors Thesis Paper

Large Scale Anomaly Detection Using Spark

Journey

Where do we come from

We went through the studies of computer engineering and security at a German university, completing our education with a PhD degree.


Our journey started with the investigation of modern online identity solutions, which led us to interesting collaborations with renowned american universities and professors. We create, collect and share educating material, development, and research of state-of-the-art computer security and engineering. We identify leading reasearch, relevant people, and beneficial programs and discuss recent topics and trends such that more people can acquire necessary expertise. With that, we hope to motivate young people to pursue PhD programs in challenging domains such as incrementally verifiable computation and privacy or to take on jobs that enhance the security and privacy of our Internet.


Statistics

What we have achieved