-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
6
-
-
84855426977
-
Secure proxy signature schemes for delegation of signing rights
-
A. Boldyreva, A. Palacio, and B. Warinschi. Secure proxy signature schemes for delegation of signing rights. Journal of Cryptology, 25:57-115, 2012.
-
(2012)
Journal of Cryptology
, vol.25
, pp. 57-115
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
8
-
-
84880890468
-
-
To appear; full version in
-
To appear; full version in Cryptology ePrint Archive, 2013:352.
-
Cryptology ePrint Archive
, vol.2013
, pp. 352
-
-
-
12
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
ACM
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. of the 13th Conf. on Computer and Comm. Security (CCS), pages 79-88. ACM, 2006.
-
(2006)
Proc. of the 13th Conf. on Computer and Comm. Security (CCS)
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
16
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
ACM
-
D. Fiore and R. Gennaro. Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proc. of the 19th Conf. on Computer and Comm. Security (CCS), pages 501-512. ACM, 2012.
-
(2012)
Proc. of the 19th Conf. on Computer and Comm. Security (CCS)
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
17
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Springer
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword search and oblivious pseudorandom functions. In Proc. of the 2nd Theory of Cryptography Conference (TCC), pages 303-324. Springer, 2005.
-
(2005)
Proc. of the 2nd Theory of Cryptography Conference (TCC)
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
18
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM, 33(4):792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
22
-
-
77952405138
-
Forward Security: Adaptive Cryptography - Time Evolution
-
chapter John Wiley and Sons
-
G. Itkis. Handbook of Information Security, chapter Forward Security: Adaptive Cryptography - Time Evolution. John Wiley and Sons, 2006.
-
(2006)
Handbook of Information Security
-
-
Itkis, G.1
-
24
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Springer-Verlag
-
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection. In Proc. of the 6th Theory of Cryptography Conference (TCC), pages 577-594. Springer-Verlag, 2009.
-
(2009)
Proc. of the 6th Theory of Cryptography Conference (TCC)
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
31
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
Springer
-
D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In Proc. of the 12th Int. Workshop on Selected Areas in Cryptography (SAC), pages 276-290. Springer, 2006.
-
(2006)
Proc. of the 12th Int. Workshop on Selected Areas in Cryptography (SAC)
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
33
-
-
78649491243
-
Efficient trace and revoke schemes
-
M. Naor and B. Pinkas. Efficient trace and revoke schemes. Int. J. Inf. Sec., 9(6):411-424, 2010.
-
(2010)
Int. J. Inf. Sec.
, vol.9
, Issue.6
, pp. 411-424
-
-
Naor, M.1
Pinkas, B.2
|