Learn More
Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and ac-cessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor(More)
Recent progress on pairing implementation has made certain pairings extremely simple and fast to compute. Hence, it is natural to examine if there are consequences for the security of pairing-based cryptography. This paper gives a method to compute eta pairings in a way which avoids the requirement for a final exponentiation. The method does not lead to any(More)
We present a novel approach to e-voting for elections, based on a new cryptographic construction, double-blind identity based en-cryption (IBE). In standard IBE, the identity string that is passed to a key generation centre (KGC) during the key extraction phase is visible to the KGC. Recent work introduced the notion of blinding the identity string,(More)
Much progress has been made over the last few decades in the identification of new anti-epileptic drugs (AEDs). However, 30% of epilepsy patients suffer poor seizure control. This underscores the need to identify alternative druggable neurotransmitter systems and drugs with novel mechanisms of action. An emerging concept is that seizure generation involves(More)
Identity management is a relevant issue at a national and international level. Any approach to identity management is incomplete unless privacy is also a consideration. Existing research on evaluating an individual's privacy preferences has shown discrepancies in the stated standards required by users, and the corresponding observed behaviour. We take a(More)
  • 1