References of "Khader, Dalia 40021101"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailDecentralized Traceable Attribute-Based Signatures
Khader, Dalia UL; El Kaafarani, Ali; Ghadafi, Essam

in LNCS (2014)

Detailed reference viewed: 136 (4 UL)
Full Text
Peer Reviewed
See detailSPN2: Single-Sided Privacy Preserving Nearest Neighbor and its Application to Face Recognition
Aouada, Djamila UL; Khader, Dalia UL

in 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14) (2014)

We address the privacy concerns that raise when running a nearest neighbor (NN) search on confidential data in a surveillance system composed of a client and a server. The proposed privacy preserving NN ... [more ▼]

We address the privacy concerns that raise when running a nearest neighbor (NN) search on confidential data in a surveillance system composed of a client and a server. The proposed privacy preserving NN search uses Boneh-Goh-Nissim encryption to hide both the query data captured by the client and the database records stored in the server. As opposed to state–of–the–art approaches which rely on a large number of interactions, this encryption enables the client to fully outsource the NN computation to the server; hence, ensuring a single-sided private computation, and resulting in a one–round protocol between the server and the client. We analyze the practical feasibility of this algorithm on a face recognition problem. We formally prove and experimentally show that the resulting system maintains the recognition rate while fully preserving the privacy of both the database and the acquired faces. [less ▲]

Detailed reference viewed: 140 (5 UL)
Full Text
Peer Reviewed
See detailProving Prêt à Voter Receipt Free Using Computational Security Models
Khader, Dalia UL; Ryan, Peter UL; Tang, Qiang UL

in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

Pret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Pret a Voter is receipt free, i.e. a voter has no way to construct a ... [more ▼]

Pret a Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Pret a Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Pret a Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists an adversary that breaks receipt freeness of the scheme then there exists an adversary that breaks the IND-CCA2 security of the Naor-Yung encryption scheme. We propose a security model that defines receipt freeness based on the indistinguishability of receipts. We show that in order to simulate the game we require an IND-CCA2 encryption scheme to create the ballots and receipts. We show that, within our model, a non-malleable onion is sufficient to guarantee receipt freeness. Most of the existing Pret a Voter schemes do not employ IND-CCA2 encryption in the construction of the ballots, but they avoid such attacks by various additional mechanisms such as pre-commitment of ballot material to the bulletin board, digitally signed ballots etc. Our use of the Naor-Yung transformation provides the IND-CCA2 security required. [less ▲]

Detailed reference viewed: 229 (4 UL)
Full Text
See detailStudying Boardroom E-Voting Schemes: Usability and Trust
Khader, Dalia UL; McCall, Roderick UL; Lopez Becerra, José Miguel UL

Report (2013)

This technical report presents initial results of an ongoing research on Usability and Trust in Boardroom E-voting Systems. OpenVote, an implementation of one of the existing boardroom e-voting schemes ... [more ▼]

This technical report presents initial results of an ongoing research on Usability and Trust in Boardroom E-voting Systems. OpenVote, an implementation of one of the existing boardroom e-voting schemes, is used as our case study. The primary contributions of this report are: ** A usability and trust study of the first version of the OpenVote System. ** The development of a questionnaire relating to usability and trust within boardroom e-voting systems. **An overview of a revised version of OpenVote. [less ▲]

Detailed reference viewed: 306 (49 UL)
See detailPassword-based Authenticated Key Establishment Protocols
Lancrenon, Jean UL; Khader, Dalia UL; Ryan, Peter UL et al

in Computer And Information Security Handbook (2013)

Detailed reference viewed: 367 (31 UL)
Full Text
Peer Reviewed
See detailA Fair and Robust Voting System by Broadcast
Khader, Dalia UL; Smyth, Ben; Ryan, Peter UL et al

in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some ... [more ▼]

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some voters abort then the election result cannot be announced, that is, the protocol is not robust. Secondly, the last voter can learn the election result before voting, that is, the protocol is not fair. Both drawbacks are typical of other decentralized e-voting protocols. This paper proposes a recovery round to enable the election result to be announced if voters abort, and we add a commitment round to ensure fairness. In addition, we provide a computational security proof of ballot secrecy. [less ▲]

Detailed reference viewed: 127 (2 UL)