-
1
-
-
67650135696
-
Key-private proxy re-encryption
-
Fischlin, M. (ed.) RSA Conference 2009. Springer, Heidelberg
-
Ateniese, G., Benson, K., Hohenberger, S.: Key-Private Proxy Re-encryption. In: Fischlin, M. (ed.) RSA Conference 2009. LNCS, vol. 5473, pp. 279-294. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
The Internet Society
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Network and Distributed System Security Symposium, NDSS. The Internet Society (2005)
-
(2005)
Network and Distributed System Security Symposium NDSS
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
67650685947
-
Possibility and impossibility results for encryption and commitment secure under selective opening
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Bellare,M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Boldyreva, A., Fehr, S., O'Neill, A.: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335-359. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'neill, A.3
-
6
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.), Alexandria, Virginia, USA, Octorber 2007. ACM, New York
-
Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, Octorber 2007, pp. 185-194. ACM, New York (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
7
-
-
58449122500
-
Chosen-ciphertext secure proxy re-encryption without pairings
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1-17. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 1-17
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
8
-
-
79955545739
-
More constructions of lossy and correlation-secure trapdoor functions
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Freeman, D.M., Goldreich, O., Kiltz, E., Rosen, A., Segev, G.: More Constructions of Lossy and Correlation-Secure Trapdoor Functions. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 279-295. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 279-295
-
-
Freeman, D.M.1
Goldreich, O.2
Kiltz, E.3
Rosen, A.4
Segev, G.5
-
9
-
-
38049073133
-
Securely obfuscating reencryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Reencryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233-252. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
11
-
-
79961049494
-
From proxy encryption primitives to a deployable secure-mailing-list solution
-
Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
-
Khurana, H., Heo, J., Pant, M.: From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 260-281. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 260-281
-
-
Khurana, H.1
Heo, J.2
Pant, M.3
-
12
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
13
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE transactions on fundamentals of electronics, Communications and computer sciences 80(1), 54-63 (1997)
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.80
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
14
-
-
77954647089
-
Chosen-ciphertext security from slightly lossy trapdoor functions
-
Mol, P., Yilek, S.: Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. In: PKC (2010)
-
(2010)
PKC
-
-
Mol, P.1
Yilek, S.2
-
15
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: STOC, New Orleans, Louisiana, USA, May 1990, pp. 427-437. ACM, New York (1990) (Pubitemid 20729148)
-
(1990)
Proc 22nd Annu ACM Symp Theory Comput
, pp. 427-437
-
-
Naor Moni1
Yung Moti2
-
16
-
-
78650714193
-
Efficient non-interactive universally composable string-commitment schemes
-
Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. Springer, Heidelberg
-
Nishimaki, R., Fujisaki, E., Tanaka, K.: Efficient Non-interactive Universally Composable String-Commitment Schemes. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 3-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5848
, pp. 3-18
-
-
Nishimaki, R.1
Fujisaki, E.2
Tanaka, K.3
-
17
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
Ladner, R.E., Dwork, C. (eds.), Victoria, British Columbia, Canada, May 2008, ACM, New York
-
Peikert, C., Waters, B.: Lossy Trapdoor Functions and Their Applications. In: Ladner, R.E., Dwork, C. (eds.) STOC, Victoria, British Columbia, Canada, May 2008, pp. 187-196. ACM, New York (2008)
-
(2008)
STOC
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
-
18
-
-
67650676703
-
Efficient lossy trapdoor functions based on the composite residuosity assumption
-
Rosen, A., Segev, G.: Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption. Cryptology ePrint Archive, Report 2008/134 (2008), http://eprint.iacr.org/
-
(2008)
Cryptology EPrint Archive, Report 2008/134
-
-
Rosen, A.1
Segev, G.2
-
19
-
-
67650674979
-
Chosen-ciphertext security via correlated products
-
Reingold, O. (ed.) Theory of Cryptography. Springer, Heidelberg
-
Rosen, A., Segev, G.: Chosen-Ciphertext Security via Correlated Products. In: Reingold, O. (ed.) Theory of Cryptography. LNCS, vol. 5444, pp. 419-436. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 419-436
-
-
Rosen, A.1
Segev, G.2
-
20
-
-
67049100266
-
CCA-secure proxy re-encryption without pairings
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Shao, J., Cao, Z.: CCA-Secure Proxy Re-encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357-376. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
21
-
-
34547450247
-
Towards a secure and interoperable DRM architecture
-
DOI 10.1145/1179509.1179524, Proceedings of the ACM Workshop On Digital Rights Management, DRM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Taban, G., Cárdenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: Yung, M., Kurosawa, K., Safavi-Naini, R. (eds.) Digital Rights Management Workshop, pp. 69-78. ACM, New York (2006) (Pubitemid 47165635)
-
(2006)
Proceedings of the ACM Workshop On Digital Rights Management, DRM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 69-78
-
-
Taban, G.1
Cardenas, A.A.2
Gligor, V.D.3
-
22
-
-
77953491924
-
-
Cryptology ePrint Archive, Report 2009/189
-
Weng, J., Chow, S.S., Yang, Y., Deng, R.H.: Efficient Unidirectional Proxy Re-Encryption. Cryptology ePrint Archive, Report 2009/189 (2009), http://eprint.iacr.org/
-
(2009)
Efficient Unidirectional Proxy Re-Encryption
-
-
Weng, J.1
Chow, S.S.2
Yang, Y.3
Deng, R.H.4
-
23
-
-
79955537435
-
-
Cryptology ePrint Archive, Report 2009/344
-
Zhang, X., Chen, M.-R., Li, X.: Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009. Cryptology ePrint Archive, Report 2009/344 (2009), http://eprint.iacr.org
-
(2009)
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
-
-
Zhang, X.1
Chen, M.-R.2
Li, X.3
|