59 research outputs found
Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version)
Searchable encryption is a technique that allows a client to store
data in encrypted form on a curious server, such that data can be
retrieved while leaking a minimal amount of information to the
server. Many searchable encryption schemes have been proposed and
proved secure in their own computational model. In this paper we
propose a generic model for the analysis of searchable
encryptions. We then identify the security parameters of
searchable encryption schemes and prove information theoretical
bounds on the security of the parameters. We argue that perfectly
secure searchable encryption schemes cannot be efficient. We
classify the seminal schemes in two categories: the schemes that
leak information upfront during the storage phase, and schemes
that leak some information at every search. This helps designers
to choose the right scheme for an application
Adaptively Secure Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as\ud
possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client. Most conventional searchable encryption schemes suffer\ud
from two disadvantages.\ud
First, searching the stored documents takes time linear in the size of the database, and/or uses heavy arithmetic operations.\ud
Secondly, the existing schemes do not consider adaptive attackers;\ud
a search-query will reveal information even about documents stored\ud
in the future. If they do consider this, it is at a significant\ud
cost to updates.\ud
In this paper we propose a novel symmetric searchable encryption\ud
scheme that offers searching at constant time in the number of\ud
unique keywords stored on the server. We present two variants of\ud
the basic scheme which differ in the efficiency of search and\ud
update. We show how each scheme could be used in a personal health\ud
record system
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are
non-monotonic in nature. This means that they cannot be expressed in current,
monotonic trust management languages such as the family of Role Based Trust
Management languages (RT). To solve this problem we propose RT-, which adds a
restricted form of negation to the standard RT language, thus admitting a
controlled form of non-monotonicity. The semantics of RT- is discussed and
presented in terms of the well-founded semantics for Logic Programs. Finally we
discuss how chain discovery can be accomplished for RT-.Comment: This paper appears in the proceedings of the 1st International
Workshop on Security and Trust Management (STM 2005). To appear in ENTC
Comparison of the haptic and visual deviations in a parallelity task
Deviations in both haptic and visual spatial experiments are thought to be caused by a biasing influence of an egocentric reference frame. The strength of this influence is strongly participant-dependent. By using a parallelity test, it is studied whether this strength is modality-independent. In both haptic and visual conditions, large, systematic and participant-dependent deviations were found. However, although the correlation between the haptic and visual deviations was significant, the explained variance due to a common factor was only 20%. Therefore, the degree to which a participant is “egocentric” depends on modality and possibly even more generally, on experimental condition
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Teacher Wellbeing: The Importance of Teacher–Student Relationships
Many studies have examined the importance of teacher-student relationships for the development of children. Much less is known, however, about how these relationships impact the professional and personal lives of teachers. This review considers the importance of teacher-student relationships for the wellbeing of teachers guided by the Transactional Model of Stress and Coping of Lazarus (1991). Based on theories on interpersonal relationships, it is postulated that teachers have a basic need for relatedness with the students in their class that originates from the close proximity between teacher and student. It is discussed that teachers internalize experiences with students in representational models of relationships that guide emotional responses in daily interactions with students, and changes teacher wellbeing in the long run. In addition, the notion of mental representations of relationships at different levels of generalization could offer a window to understand how individual teacher-student relationships may affect the professional and personal self-esteem of teachers. Lastly, it is argued that the influence of student misbehavior on teacher stress may be more fully understood from a relationship perspective. The review shows that few studies have directly tested these propositions and offers suggestions for future research
The role of teacher-student interactions in the development of problem behavior during the ransition to primary school
Towards an Information Theoretic Analysis of Searchable Encryption
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server. Many searchable encryption schemes have been proposed and proved secure in their own computational model. In this paper we propose a generic model for the analysis of searchable encryptions. We then identify the security parameters of searchable encryption schemes and prove information theoretical bounds on the security of the parameters. We argue that perfectly secure searchable encryption schemes cannot be efficient. We classify the seminal schemes in two categories: the schemes that leak information upfront during the storage phase, and schemes that leak some information at every search. This helps designers to choose the right scheme for an application
- …