Back to Results
First PageMeta Content
ElGamal encryption / Malleability / RSA / Index of cryptography articles / Mental poker / Cryptography / Public-key cryptography / Proxy re-encryption


Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]
Add to Reading List

Document Date: 2013-09-09 23:04:55


Open Document

File Size: 271,16 KB

Share Result on Facebook

City

Santa Barbara / Boston / Berlin / Espoo / Miami / /

Company

Distributed Computing Systems / Air Force Research Laboratory / Clarendon Press / ACM Press / IFIP Working Group / Intel Corporation / SIAM Journal / M. J. Fischer N. A. / /

Country

Germany / Anguilla / Sweden / United States / Finland / /

Currency

USD / /

/

Event

FDA Phase / Product Issues / /

Facility

George Mason University / Michael A. Marsh Institute / Computer Science Royal Institute of Technology / Cornell University / /

IndustryTerm

e-vault / compromised server / deterministic solutions / required server / curious server / efficient protocols / faulty processor / individual server / intrusion tolerant applications / verifiable dual encryption protocol / actual protocol / correct server / re-encryption protocols / threshold signature protocol / cryptographic protocols / re-encryption protocol / asynchronous protocol / reencryption protocol / computing / on-line certification authority / trusted publish/subscribe infrastructure / specified protocols / /

NaturalFeature

Indies / /

Organization

Defense Advanced Research Projects Agency / National Science Foundation / University of Maryland / U.S. Government / IEEE Computer Society Technical Committee / American Federation of Information Processing Societies Proceedings / Computer Science Department / Cornell University / Department of Numerical Analysis / Air Force Material Command / George Mason University / Institute of Technology / Department of Defense / IEEE Computer Society / /

Person

Coding / Cryptography / Fred B. Schneider / C. Jutla / Anna Redz / R. Gennaro / Ilya Mironov / Mark Lindermann / Cj / Markus Jakobsson / T. Rabin / Cynthia Dwork / J. A. Garay / Dan Simon / /

Position

editor / compromised coordinator / IEEE coordinator / designated coordinator / Coordinator / Correct Coordinator / Private / protocol designer / /

Product

Franklin / processor / Figure / Coordinators Now / /

ProgrammingLanguage

FL / /

ProvinceOrState

Kansas / California / /

PublishedMedium

Journal of the ACM / Cryptology ePrint Archive / SIAM Journal on Computing / IEEE Transactions on Information Theory / Communications of the ACM / Theory of Computing / Lecture Notes in Computer Science / /

Region

British West Indies / /

Technology

distributed blinding protocol / asymmetric proxy re-encryption / one faulty processor / actual protocol / re-encryption protocol / Extant re-encryption protocols / ElGamal re-encryption / Divertible protocols / designing efficient protocols / partial encryption / 3 The protocols / specified protocols / private key / reencryption protocol / verifiable dual encryption protocol / ElGamal encryption / asynchronous protocol / public key encryption / encryption / re-encryption protocols / 1 Introduction Cryptographic protocols / cryptography / public key / atomic proxy encryption / threshold signature protocol / encryption Protocol / Cryptographic protocols / Verifiable dual encryption / /

URL

http /

SocialTag