First Page | Meta Content | |
---|---|---|
Document Date: 2005-02-04 17:13:07Open Document File Size: 279,18 KBShare Result on FacebookCityBaltimore / Zurich / /CompanyG1 / Bob / IBM Research Labs / G2 / Secure File Systems / Artificial Intelligence Laboratory / /CountrySwitzerland / United States / /Currencypence / / /EventNatural Disaster / /FacilityJohns Hopkins University Information Security Institute / Massachusetts Institute of Technology / Johns Hopkins University / /IndustryTermdistributed file systems / server operator / polynomial time algorithms / trivial solutions / trusted access control server / access control server / proxy re-encryption protocols / potential applications / encrypted file systems / semi-trusted access control server / healthcare institution / re-encryption key generation algorithm / decryption algorithms / access control server operator / encryption algorithms / law enforcement / natural applications / computing / online participant / /OrganizationThe Johns Hopkins University / Massachusetts Institute of Technology / Johns Hopkins University Information Security Institute / Department of Computer Science / /PersonMatthew Green† Susan Hohenberger / Kevin Fu‡ Matthew Green / Bob / Alice / Giuseppe Ateniese† Kevin Fu / /Positionhb / external filtering contractor / secretary / CPA / /ProductTate / Franklin / /ProvinceOrStateMaryland / California / /Technology1 Introduction Proxy re-encryption / proxy re-encryption protocols / encryption algorithms / re-encryption key generation algorithm / quorum-based protocol / proxy re-encryption / Unidirectional Proxy Re-encryption / secret key / PPT algorithms / decryption algorithms / universal re-encryption / atomic proxy re-encryption / 2 Definitions Our protocols / Encryption / second-level encryption / cryptography / BBS / unidirectional proxy encryption / Proxy Re-encryption Proxy re-encryption / public key / BBS re-encryption / Using proxy re-encryption / second-level encryptions / secure re-encryption / polynomial time algorithms / institution-wide email encryption / /SocialTag |