Proxy re-encryption

Results: 44



#Item
21Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-28 13:13:41
22Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1  School of Information Systems, Singapore Management University,

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
23Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
24Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 11:25:14
25CS255: Cryptography and Computer Security  Winter 2008 Assignment #1 Due: Wednesday, Jan. 30, 2008, in class.

CS255: Cryptography and Computer Security Winter 2008 Assignment #1 Due: Wednesday, Jan. 30, 2008, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-01-22 22:54:40
26Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
27Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:04:55
28The Ephemerizer: Making Data Disappear

The Ephemerizer: Making Data Disappear

Add to Reading List

Source URL: www.filibeto.org

Language: English - Date: 2007-02-09 08:43:57
29Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
30Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:18