-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
33749661564
-
A cryptographic framework for the controlled release of certified data
-
B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, of, Springer
-
E. Bangerter, J. Camenisch, and A. Lysyanskaya. A cryptographic framework for the controlled release of certified data. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, volume 3957 of LNCS, pages 20-42. Springer, 2004.
-
(2004)
LNCS
, vol.3957
, pp. 20-42
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
-
3
-
-
84949221411
-
Authenticated diffiehellman key agreement protocols
-
S. E. Tavares and H. Meijer, editors, Selected Areas in Cryptography, of, Springer
-
S. Blake-Wilson and A. Menezes. Authenticated diffiehellman key agreement protocols. In S. E. Tavares and H. Meijer, editors, Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, pages 339-361. Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
4
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
T. Okamoto, editor, ASIACRYPT, of, Springer
-
J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In T. Okamoto, editor, ASIACRYPT, volume 1976 of LNCS, pages 331-345. Springer, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
5
-
-
35248839965
-
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, SCN, 2576 of LNCS, pages 268-289. Springer, 2002.
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In S. Cimato, C. Galdi, and G. Persiano, editors, SCN, volume 2576 of LNCS, pages 268-289. Springer, 2002.
-
-
-
-
6
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
M. K. Franklin, editor, CRYPTO, of, Springer
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. K. Franklin, editor, CRYPTO, volume 3152 of LNCS, pages 56-72. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
D. Boneh, editor, CRYPTO, of, Springer
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In D. Boneh, editor, CRYPTO, volume 2729 of LNCS, pages 126-144. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
8
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, editor, CRYPTO, of, Springer
-
Y. Desmedt and Y. Frankel. Threshold cryptosystems. In G. Brassard, editor, CRYPTO, volume 435 of Lecture Notes in Computer Science, pages 307-315. Springer, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
10
-
-
35048899238
-
Universal re-encryption for mixnets
-
T. Okamoto, editor, CT-RSA, of, Springer
-
P. Golle, M. Jakobsson, A. Juels, and P. F. Syverson. Universal re-encryption for mixnets. In T. Okamoto, editor, CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages 163-178. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2964
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.F.4
-
11
-
-
57949106557
-
Proxy cryptography revisited
-
The Internet Society
-
A.-A. Ivan and Y. Dodis. Proxy cryptography revisited. In NDSS. The Internet Society, 2003.
-
(2003)
NDSS
-
-
Ivan, A.-A.1
Dodis, Y.2
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
57949117183
-
Conditional privacy using re-encryption
-
Technical Report 14076, Queensland University of Technology, October
-
S. Suriadi, E. Foo, and J. Smith. Conditional privacy using re-encryption. Technical Report 14076, Queensland University of Technology, October 2008. http://eprints.qut.edu.au/archive/00014076/.
-
(2008)
-
-
Suriadi, S.1
Foo, E.2
Smith, J.3
|