60 research outputs found

    Ordering our world: the quest for traces of temporal organization in autobiographical memory

    No full text
    An experiment examined the idea, derived from the Self Memory System model (Conway & Pleydell-Pearce, 2000), that autobiographical events are sometimes tagged in memory with labels reflecting the life era in which an event occurred. The presence of such labels should affect the ease of judgments of the order in which life events occurred. Accordingly, 39 participants judged the order of two autobiographical events. Latency data consistently showed that between-era judgments were faster than within-era judgments, when the eras were defined in terms of either: (a) college versus high school, (b) academic quarter within year, or (c) academic year within school. The accuracy data similarly supported the presence of a between-era judgment effect for the college versus high school dichotomy

    New constructions and practical applications for private stream searching (extended abstract

    No full text
    Abstract A system for private stream searching allows a clientto retrieve documents matching some search criteria from a remote server while the server evaluating the re-quest remains provably oblivious to the search criteria. In this extended abstract, we give a high level outlineof a new scheme for this problem and an experimental analysis of its scalability. The new scheme is highlyefficient in practice. We demonstrate the practical applicability of the scheme by considering its performancein the demanding scenario of providing a privacy preserving version of the Google News Alerts service.

    Ciphertext-policy attribute-based encryption

    No full text
    In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control. However, if any server storing the data is compromised, then the confidentiality of the data will be compromised. In this paper we present a system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption. By using our techniques encrypted data can be kept confidential even if the storage server is untrusted; moreover, our methods are secure against collusion attacks. Previous Attribute-Based Encryption systems used attributes to describe the encrypted data and built policies into user’s keys; while in our system attributes are used to describe a user’s credentials, and a party encrypting data determines a policy for who can decrypt. Thus, our methods are conceptually closer to traditional access control methods such as Role-Based Access Control (RBAC). In addition, we provide an implementation of our system and give performance measurements.

    Cryptographic methods for storing ballots on a voting machine

    No full text
    A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storage system due to Molnar et al. provides tamper-evidence properties while maintaining voter privacy by storing ballots on a programmable, read-only memory (PROM). We achieve the same properties and protect against additional threats of memory replacement through cryptographic techniques, without the use of special hardware. Our approach is based on a new cryptographic primitive called History-Hiding Append-Only Signatures.
    • …
    corecore