Back to Results
First PageMeta Content
Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability


Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡
Add to Reading List

Document Date: 2010-02-04 10:25:07


Open Document

File Size: 303,87 KB

Share Result on Facebook

Company

IBM Zurich Research Laboratory / Oracle / /

Country

Switzerland / /

/

Facility

University of Virginia / Johns Hopkins University / /

Holiday

Assumption / /

IndustryTerm

potential applications / cryptographic applications / computing / important practical applications / encryption algorithm / circuit family computing re-encryption / keyword search / learning algorithm / /

Organization

University of Virginia / National Science Foundation / Diffie-Hellman / MIT / Johns Hopkins University / /

Person

Bob / Kalai / Alice / Guy N. Rothblum / /

Position

hb / /

ProvinceOrState

Virginia / /

Technology

Encryption / learning algorithm / cryptography / public key / semantically-secure re-encryption / encryption algorithm / Semantically secure encryption / proxy re-encryption / encryption system / circuit family computing re-encryption / circuits implementing re-encryption / secret key / /

SocialTag