-
1
-
-
84905127036
-
-
https://certivox.com/
-
-
-
-
2
-
-
84905107967
-
-
http://crypto.stanford.edu/pbc/
-
-
-
-
3
-
-
84978405320
-
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
-
OSDI
-
Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger Wattenhofer FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment Proceedings of the 5th Symposium on Operating Systems Design and Implementation OSDI December 9-11, 2002 1 14
-
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
4
-
-
67650135696
-
Key-private proxy re-encryption
-
Marc Fischlin, CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 Lect. Notes Comput. Sci. Springer
-
Giuseppe Ateniese, Karyn Benson, and Susan Hohenberger Key-private proxy re-encryption Marc Fischlin, Topics in Cryptology CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009 Lect. Notes Comput. Sci. vol. 5473 2009 Springer 279 294
-
(2009)
Topics in Cryptology
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
5
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
The Internet Society
-
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage NDSS 2005 The Internet Society
-
(2005)
NDSS
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
6
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. 9 1 2006 1 30
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
7
-
-
0027764777
-
A cryptographic file system for UNIX
-
Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby, ACM
-
Matt Blaze A cryptographic file system for UNIX Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, Victoria Ashby, ACM Conference on Computer and Communications Security 1993 ACM 9 16
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 9-16
-
-
Blaze, M.1
-
8
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Kaisa Nyberg, Lect. Notes Comput. Sci. Springer
-
Matt Blaze, Gerrit Bleumer, and Martin Strauss Divertible protocols and atomic proxy cryptography Kaisa Nyberg, EUROCRYPT Lect. Notes Comput. Sci. vol. 1403 1998 Springer 127 144
-
(1998)
EUROCRYPT
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
9
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson, ACM
-
Ran Canetti, and Susan Hohenberger Chosen-ciphertext secure proxy re-encryption Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson, ACM Conference on Computer and Communications Security 2007 ACM 185 194
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
10
-
-
70350635910
-
Conditional proxy broadcast re-encryption
-
Colin Boyd, Juan Manuel González Nieto, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 Lect. Notes Comput. Sci. Springer
-
Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, Jianying Zhou, and Robert H. Deng Conditional proxy broadcast re-encryption Colin Boyd, Juan Manuel González Nieto, Information Security and Privacy 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 Lect. Notes Comput. Sci. vol. 5594 2009 Springer 327 342
-
(2009)
Information Security and Privacy
, vol.5594
, pp. 327-342
-
-
Chu, C.-K.1
Weng, J.2
Chow, S.S.M.3
Zhou, J.4
Deng, R.H.5
-
11
-
-
85033498470
-
SiriUS: Securing remote untrusted storage
-
The Internet Society
-
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh SiriUS: securing remote untrusted storage NDSS 2003 The Internet Society
-
(2003)
NDSS
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
12
-
-
38049073133
-
Securely obfuscating re-encryption
-
Salil P. Vadhan, Lect. Notes Comput. Sci. Springer
-
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, and Vinod Vaikuntanathan Securely obfuscating re-encryption Salil P. Vadhan, TCC Lect. Notes Comput. Sci. vol. 4392 2007 Springer 233 252
-
(2007)
TCC
, vol.4392
, pp. 233-252
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
14
-
-
40249113119
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Ronald Cramer, Lect. Notes Comput. Sci. Springer
-
Benoît Libert, and Damien Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption Ronald Cramer, Public Key Cryptography Lect. Notes Comput. Sci. vol. 4939 2008 Springer 360 379
-
(2008)
Public Key Cryptography
, vol.4939
, pp. 360-379
-
-
Libert, B.1
Vergnaud, D.2
-
15
-
-
77957655174
-
Cca proxy re-encryption without bilinear maps in the standard model
-
Phong Q. Nguyen, David Pointcheval, Lect. Notes Comput. Sci. Springer
-
Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka Cca proxy re-encryption without bilinear maps in the standard model Phong Q. Nguyen, David Pointcheval, Public Key Cryptography Lect. Notes Comput. Sci. vol. 6056 2010 Springer 261 278
-
(2010)
Public Key Cryptography
, vol.6056
, pp. 261-278
-
-
Matsuda, T.1
Nishimaki, R.2
Tanaka, K.3
-
16
-
-
67049100266
-
Cca-secure proxy re-encryption without pairings
-
Stanislaw Jarecki, Gene Tsudik, Lect. Notes Comput. Sci. Springer
-
Jun Shao, and Zhenfu Cao Cca-secure proxy re-encryption without pairings Stanislaw Jarecki, Gene Tsudik, Public Key Cryptography Lect. Notes Comput. Sci. vol. 5443 2009 Springer 357 376
-
(2009)
Public Key Cryptography
, vol.5443
, pp. 357-376
-
-
Shao, J.1
Cao, Z.2
-
17
-
-
78651327986
-
Cca-secure pre scheme without random oracles
-
Jun Shao, Zhenfu Cao, and Peng Liu Cca-secure pre scheme without random oracles J. Cryptol. 2010 2010 112
-
(2010)
J. Cryptol.
, vol.2010
, pp. 112
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
18
-
-
84859918931
-
Anonymous proxy re-encryption
-
Jun Shao, Peng Liu, Guiyi Wei, and Yun Ling Anonymous proxy re-encryption J. Secur. Commun. Netw. 5 5 2012 439 449
-
(2012)
J. Secur. Commun. Netw.
, vol.5
, Issue.5
, pp. 439-449
-
-
Shao, J.1
Liu, P.2
Wei, G.3
Ling, Y.4
-
19
-
-
84857361860
-
Achieving key privacy without losing CCA security in proxy re-encryption
-
Jun Shao, Peng Liu, and Yuan Zhou Achieving key privacy without losing CCA security in proxy re-encryption J. Syst. Softw. 85 3 2012 655 665
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.3
, pp. 655-665
-
-
Shao, J.1
Liu, P.2
Zhou, Y.3
-
21
-
-
77952322019
-
Cca-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
-
Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, and Feng Bao Cca-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Sci. China, Ser. F 53 3 2010 593 606
-
(2010)
Sci. China, Ser. F
, vol.53
, Issue.3
, pp. 593-606
-
-
Weng, J.1
Chen, M.-R.2
Yang, Y.3
Deng, R.H.4
Chen, K.5
Bao, F.6
-
22
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE Press
-
Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou Achieving secure, scalable, and fine-grained data access control in cloud computing INFOCOM 2010 IEEE Press 534 542
-
(2010)
INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|