<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher
Cryptography
Public-key cryptography
Key management
Public key infrastructure
Proxy re-encryption
Identity-based cryptography
Encryption
Symmetric-key algorithm
Key generation
Integrated Encryption Scheme
Hybrid cryptosystem
Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Download Document from Source Website

File Size: 610,77 KB

Share Document on Facebook

Similar Documents

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

The BlueJay Ultra-Lightweight Hybrid Cryptosystem

DocID: 1aQjp - View Document

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C

DocID: 13gNT - View Document

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1  2

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

DocID: 12MtC - View Document

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

DocID: 12Ie4 - View Document

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

DocID: NZdG - View Document