-
1
-
-
33745218758
-
Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage
-
February
-
G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage, ACM Trans. on Information and System Security,9(1):1-30, February 2006.
-
(2006)
ACM Trans. on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
83455252951
-
-
Previously, in
-
Previously, in NDSS, pages 29-43, 2005.
-
(2005)
NDSS
, pp. 29-43
-
-
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
M. Blaze, G. Bleumer and M. Strauss. Divertible protocols and atomic proxy cryptography,In Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144.Springer, Heidelberg,1998. (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
18844410277
-
A DRM Security Architecture for Home Networks
-
B. C. Popescu, B. Crispo, F. L.A.J. Kamperman and A. S. Tanenbaum. A DRM Security Architecture for Home Networks In Proceedings of the 4th ACM workshop on Digital rights management. Washington, DC, USA, October 25, 2004.
-
Proceedings of the 4th ACM Workshop on Digital Rights Management. Washington, DC, USA, October 25, 2004
-
-
Popescu, B.C.1
Crispo, B.2
Kamperman, F.L.A.J.3
Tanenbaum, A.S.4
-
5
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
ACM, New York
-
R. Canetti and S. Hohenberger. Chosen-ciphertext secure proxy re-encryption, In ACM CCS, pp. 185-194. ACM, New York, 2007.
-
(2007)
ACM CCS
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
6
-
-
57949106557
-
Proxy cryptography revisited
-
Y. Dodis and A. Ivan. Proxy cryptography revisited, In NDSS,2003.
-
(2003)
NDSS
-
-
Dodis, Y.1
Ivan, A.2
-
7
-
-
38049073133
-
Securely Obfuscating Re-encryption
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
S. Hohenberger, G. N. Rothblum, A. Shelat and V. Vaikuntanathan. Securely Obfuscating Re-encryption, In Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp.233-252. Springer, Heidelberg, 2007.
-
(2007)
LNCS
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
8
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Cramer, R. (ed.) PKC 2008. Springer,Heidelberg
-
B. Libert and D. Vergnaud. Unidirectional chosen-ciphertext secure proxy re-encryption, In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer,Heidelberg,2008.
-
(2008)
LNCS
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
10
-
-
35448976398
-
Digital rights management for home networks using ID-based public key system and group signature
-
P. Qingqi, M. Jianfeng,D. Jinxiu and F. Kefeng. Digital rights management for home networks using ID-based public key system and group signature, Chinese Journal of Electronics, vol 16, No. 4, pp 653-662, 2007.
-
(2007)
Chinese Journal of Electronics
, vol.16
, Issue.4
, pp. 653-662
-
-
Qingqi, P.1
Jianfeng, M.2
Jinxiu, D.3
Kefeng, F.4
-
11
-
-
0042586782
-
Content Protection in the Digital Home
-
M. Ripley, C. B. S. Traw, Steve Balogh and Michael Reed. Content Protection in the Digital Home Intel Technology Journal, 6(9):49-56, 2002.
-
(2002)
Intel Technology Journal
, vol.6
, Issue.9
, pp. 49-56
-
-
Ripley, M.1
Traw, C.B.S.2
Balogh, S.3
Reed, M.4
|