Learn More
Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and ac-cessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor(More)
Recent progress on pairing implementation has made certain pairings extremely simple and fast to compute. Hence, it is natural to examine if there are consequences for the security of pairing-based cryptography. This paper gives a method to compute eta pairings in a way which avoids the requirement for a final exponentiation. The method does not lead to any(More)
We present a novel approach to e-voting for elections, based on a new cryptographic construction, double-blind identity based en-cryption (IBE). In standard IBE, the identity string that is passed to a key generation centre (KGC) during the key extraction phase is visible to the KGC. Recent work introduced the notion of blinding the identity string,(More)
Auditory selective attention is the ability to enhance the processing of a single sound source, while simultaneously suppressing the processing of other competing sound sources. Recent research has addressed a long-running debate by showing that endogenous attention produces effects on obligatory sensory responses to continuous and competing auditory(More)
Much progress has been made over the last few decades in the identification of new anti-epileptic drugs (AEDs). However, 30% of epilepsy patients suffer poor seizure control. This underscores the need to identify alternative druggable neurotransmitter systems and drugs with novel mechanisms of action. An emerging concept is that seizure generation involves(More)
  • C Diaz, B De Decker, M Layouni, G Nigusse, B Preneel, A Rial +28 others
  • 2009
This report presents the basic research results of the ADAPID project from in 2007 and 2008. It summarizes twenty research papers, most of which have been published in scientific journals of conferences, while the rest are still subject to submission or review processes. Our research results can be classified in five main areas, corresponding to each of the(More)
Identity management is a relevant issue at a national and international level. Any approach to identity management is incomplete unless privacy is also a consideration. Existing research on evaluating an individual's privacy preferences has shown discrepancies in the stated standards required by users, and the corresponding observed behaviour. We take a(More)
Chameleon Signatures are based on the traditional hash-and-sign paradigm. A secure scheme provides the properties of non-transferability and non-repudiation. That is, the contents of the message may not be disclosed without the signer's consent. The scheme also creates an undeniable commitment on the part of the signer to the message. The chameleon hash(More)
  • 1