Back to Results
First PageMeta Content
ElGamal encryption / Ciphertext / RSA / Cipher / Paillier cryptosystem / Multiple encryption / Authenticated encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Proxy re-encryption


Document Date: 2005-02-04 17:13:07


Open Document

File Size: 279,18 KB

Share Result on Facebook

City

Baltimore / Zurich / /

Company

G1 / Bob / IBM Research Labs / G2 / Secure File Systems / Artificial Intelligence Laboratory / /

Country

Switzerland / United States / /

Currency

pence / /

/

Event

Natural Disaster / /

Facility

Johns Hopkins University Information Security Institute / Massachusetts Institute of Technology / Johns Hopkins University / /

IndustryTerm

distributed file systems / server operator / polynomial time algorithms / trivial solutions / trusted access control server / access control server / proxy re-encryption protocols / potential applications / encrypted file systems / semi-trusted access control server / healthcare institution / re-encryption key generation algorithm / decryption algorithms / access control server operator / encryption algorithms / law enforcement / natural applications / computing / online participant / /

Organization

The Johns Hopkins University / Massachusetts Institute of Technology / Johns Hopkins University Information Security Institute / Department of Computer Science / /

Person

Matthew Green† Susan Hohenberger / Kevin Fu‡ Matthew Green / Bob / Alice / Giuseppe Ateniese† Kevin Fu / /

Position

hb / external filtering contractor / secretary / CPA / /

Product

Tate / Franklin / /

ProvinceOrState

Maryland / California / /

Technology

1 Introduction Proxy re-encryption / proxy re-encryption protocols / encryption algorithms / re-encryption key generation algorithm / quorum-based protocol / proxy re-encryption / Unidirectional Proxy Re-encryption / secret key / PPT algorithms / decryption algorithms / universal re-encryption / atomic proxy re-encryption / 2 Definitions Our protocols / Encryption / second-level encryption / cryptography / BBS / unidirectional proxy encryption / Proxy Re-encryption Proxy re-encryption / public key / BBS re-encryption / Using proxy re-encryption / second-level encryptions / secure re-encryption / polynomial time algorithms / institution-wide email encryption / /

SocialTag