Proxy re-encryption

Results: 44



#Item
21Digital signature / RSA / Schnorr signature / Electronic signature / Proxy re-encryption / Ring signature / Cryptography / Public-key cryptography / Group signature

Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-28 13:13:41
22ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
23ID-based encryption / Key size / Key / Symmetric-key algorithm / Encryption / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cipher / Public-key cryptography

Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Sashank Dara

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 09:55:41
24Public-key cryptography / Password / Deniable encryption / Encrypting File System / Cryptography / Proxy re-encryption / Cloud computing

Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 11:25:14
25RSA / Block cipher / Ciphertext stealing / Proxy re-encryption / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2008 Assignment #1 Due: Wednesday, Jan. 30, 2008, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-01-22 22:54:40
26ID-based encryption / Secrecy / Homomorphic encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Security

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
27ElGamal encryption / Malleability / RSA / Index of cryptography articles / Mental poker / Cryptography / Public-key cryptography / Proxy re-encryption

Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:04:55
28Blind signature / Proxy re-encryption / Deniable encryption / Cryptography / Public-key cryptography / Key

The Ephemerizer: Making Data Disappear

Add to Reading List

Source URL: www.filibeto.org

Language: English - Date: 2007-02-09 08:43:57
29ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
30Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:18
UPDATE