-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: NDSS, pp. 29-43 (2005)
-
(2005)
NDSS
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
33745782314
-
Proxy re-signatures: New definitions, algorithms, and applications
-
DOI 10.1145/1102120.1102161, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: ACM CCS, pp. 310-319. ACM, New York (2005) (Pubitemid 44022014)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 310-319
-
-
Ateniese, G.1
Hohenberger, S.2
-
4
-
-
84946837370
-
Key-Privacy in Public-Key Encryption
-
Advances in Cryptology - ASIACRYPT 2001
-
Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566-582. Springer, Heidelberg (2001) (Pubitemid 33371207)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
5
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
6
-
-
35048887476
-
Short group signatures
-
In: Franklin, M. (ed.) Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004. LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001) (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
ACM, New York
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS, pp. 185-194. ACM, New York (2007)
-
(2007)
ACM CCS
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
9
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
In: Wiener, M. (ed.) Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
10
-
-
38049073133
-
Securely obfuscating re-encryption
-
In: Vadhan, S.P. (ed.) Springer, Heidelberg
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
(2007)
TCC 2007. LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
11
-
-
79961049494
-
From proxy encryption primitives to a deployable secure-mailing-list solution
-
In: Ning, P., Qing, S., Li, N. (eds.) Springer, Heidelberg
-
Khurana, H., Heo, J., Pant, M.: From proxy encryption primitives to a deployable secure-mailing-list solution. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 260-281. Springer, Heidelberg (2006)
-
(2006)
ICICS 2006. LNCS
, vol.4307
, pp. 260-281
-
-
Khurana, H.1
Heo, J.2
Pant, M.3
-
12
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy reencryption
-
In: Cramer, R. (ed.) Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
PKC 2008. LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
14
-
-
34547450247
-
Towards a secure and interoperable DRM architecture
-
DOI 10.1145/1179509.1179524, Proceedings of the ACM Workshop On Digital Rights Management, DRM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Taban, G., Cárdenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: DRM 2006, pp. 69-78. ACM, New York (2006) (Pubitemid 47165635)
-
(2006)
Proceedings of the ACM Workshop On Digital Rights Management, DRM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 69-78
-
-
Taban, G.1
Cardenas, A.A.2
Gligor, V.D.3
|