First Page | Document Content | |
---|---|---|
Date: 2010-02-04 10:25:07Security Semantic security Advantage Secrecy Proxy re-encryption Obfuscation RSA Encryption Hardware obfuscation Cryptography Cyberwarfare Ciphertext indistinguishability | Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡Add to Reading ListSource URL: people.csail.mit.eduDownload Document from Source WebsiteFile Size: 303,87 KBShare Document on Facebook |