-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
10.1145/1127345.1127346
-
G. Ateniese K. Fu M. Green S. Hohenberger 2006 Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. 9 1 1 30 10.1145/1127345.1127346
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
Advances in Cryptology - CRYPTO 2001
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S.P. Vadhan, K. Yang, On the (im)possibility of obfuscating programs, in Advances in Cryptology-CRYPTO'01, ed. by J. Kilian. Lecture Notes in Computer Science, vol. 2139 (Springer, Berlin, 2001), pp. 1-18 (Pubitemid 33317905)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography, in Advances in Cryptology-EUROCRYPT'98, ed. by K. Nyberg. Lecture Notes in Computer Science, vol. 1403 (Springer, Berlin, 1998), pp. 127-144 (Pubitemid 128081481)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
5
-
-
35048887476
-
Short group signatures
-
M.K. Franklin (eds). Springer Berlin
-
D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology-CRYPTO'04, ed. by M.K. Franklin. Lecture Notes in Computer Science, vol. 3152 (Springer, Berlin, 2004), pp. 41-55
-
(2004)
Advances in Cryptology-CRYPTO'04 Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
6
-
-
33746104815
-
Fully collusion resistant traitor tracing with short ciphertexts and private keys
-
4004 LNCS, DOI 10.1007/11761679-34, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
D. Boneh, A. Sahai, B. Waters, Fully collusion resistant traitor tracing with short ciphertexts and private keys, in Advances in Cryptology-EUROCRYPT'06, ed. by S. Vaudenay. Lecture Notes in Computer Science, vol. 4004 (Springer, Berlin, 2006), pp. 573-592 (Pubitemid 44072262)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 573-592
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
7
-
-
84958626314
-
Towards Realizing Random Oracles: Hash Functions that Hide All Partial Information
-
Advances in Cryptology - CRYPTO '97
-
R. Canetti, Towards realizing random oracles: Hash functions that hide all partial information, in Advances in Cryptology-CRYPTO'97, ed. by B.S. Kaliski Jr. Lecture Notes in Computer Science, vol. 1294 (Springer, Berlin, 1997), pp. 455-469 (Pubitemid 127112572)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 455-469
-
-
Canetti, R.1
-
8
-
-
0031624874
-
Perfectly one-way probabilistic hash functions (preliminary version)
-
ACM New York
-
R. Canetti, D. Micciancio, O. Reingold, Perfectly one-way probabilistic hash functions (preliminary version), in 30th Symposium on Theory of Computing (STOC) (ACM, New York, 1998), pp. 131-140
-
(1998)
30th Symposium on Theory of Computing (STOC)
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
10
-
-
34848837353
-
Correcting errors without leaking partial information
-
DOI 10.1145/1060590.1060688, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
Y. Dodis, A. Smith, Correcting errors without leaking partial information, in 37th ACM Symposium on Theory of Computing (STOC), ed. by H.N. Gabow, R. Fagin. (ACM, New York, 2005), pp. 654-663 (Pubitemid 43098639)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
12
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
DOI 10.1109/SFCS.2005.60, 1530747, Proceedings - 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005
-
S. Goldwasser, Y.T. Kalai, On the impossibility of obfuscation with auxiliary input, in 46th IEEE Symposium on Foundations of Computer Science (FOCS), ed. by É. Tardos. (IEEE Comput. Soc., Los Alamitos, 2005), pp. 553-562 (Pubitemid 44375765)
-
(2005)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, vol.2005
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
14
-
-
84937414062
-
Zero-knowledge and code obfuscation
-
T. Okamoto (eds). Springer Berlin
-
S. Hada, Zero-knowledge and code obfuscation, in Advances in Cryptology-ASIACRYPT'00, ed. by T. Okamoto. Lecture Notes in Computer Science, vol. 1976 (Springer, Berlin, 2000), pp. 443-457
-
(2000)
Advances in Cryptology-ASIACRYPT'00 Lecture Notes in Computer Science
, vol.1976
, pp. 443-457
-
-
Hada, S.1
-
15
-
-
38049056625
-
Obfuscation for cryptographic purposes
-
S.P. Vadhan (eds). Springer Berlin
-
D. Hofheinz, J. Malone-Lee, M. Stam, Obfuscation for cryptographic purposes, in 4th Theory of Cryptography Conference (TCC), ed. by S.P. Vadhan. Lecture Notes in Computer Science, vol. 4392 (Springer, Berlin, 2007), pp. 214-232
-
(2007)
4th Theory of Cryptography Conference (TCC) Lecture Notes in Computer Science
, vol.4392
, pp. 214-232
-
-
Hofheinz, D.1
Malone-Lee, J.2
Stam, M.3
-
17
-
-
80053050424
-
-
Personal Communication
-
R. Pass, Personal Communication (2006)
-
(2006)
-
-
Pass, R.1
-
19
-
-
0021518106
-
Theory of the learnable
-
DOI 10.1145/1968.1972
-
L.G. Valiant 1984 A theory of the learnable Commun. ACM 27 11 1134 1142 0587.68077 10.1145/1968.1972 (Pubitemid 15425292)
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
20
-
-
33745541383
-
On obfuscating point functions
-
DOI 10.1145/1060590.1060669, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
H. Wee, On obfuscating point functions, in 37th ACM Symposium on Theory of Computing (STOC), ed. by H.N. Gabow, R. Fagin. (ACM, New York, 2005), pp. 523-532 (Pubitemid 43098625)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 523-532
-
-
Wee, H.1
|