Learn More
Searchable encryption schemes provide an important mechanism to cryptographically protect data while keeping it available to be searched and ac-cessed. In a common approach for their construction, the encrypting entity chooses one or several keywords that describe the content of each encrypted record of data. To perform a search, a user obtains a trapdoor(More)
Recent progress on pairing implementation has made certain pairings extremely simple and fast to compute. Hence, it is natural to examine if there are consequences for the security of pairing-based cryptography. This paper gives a method to compute eta pairings in a way which avoids the requirement for a final exponentiation. The method does not lead to any(More)
We present a novel approach to e-voting for elections, based on a new cryptographic construction, double-blind identity based en-cryption (IBE). In standard IBE, the identity string that is passed to a key generation centre (KGC) during the key extraction phase is visible to the KGC. Recent work introduced the notion of blinding the identity string,(More)
iii ACKNOWLEDGEMENTS I would like to thank the Communications and Marketing office of American University for giving me the opportunity to work my way through graduate school. I would also like to thank the School of Communication faculty, especially professor Lauren Feldman. Finally, thanks to my friends and family for their constant support. iv ABSTRACT(More)
This report presents the basic research results of the ADAPID project from in 2007 and 2008. It summarizes twenty research papers, most of which have been published in scientific journals of conferences, while the rest are still subject to submission or review processes. Our research results can be classified in five main areas, corresponding to each of the(More)
Identity management is a relevant issue at a national and international level. Any approach to identity management is incomplete unless privacy is also a consideration. Existing research on evaluating an individual's privacy preferences has shown discrepancies in the stated standards required by users, and the corresponding observed behaviour. We take a(More)
Chameleon Signatures are based on the traditional hash-and-sign paradigm. A secure scheme provides the properties of non-transferability and non-repudiation. That is, the contents of the message may not be disclosed without the signer's consent. The scheme also creates an undeniable commitment on the part of the signer to the message. The chameleon hash(More)
  • 1