Proxy re-encryption

Results: 44



#Item
31Security / Semantic security / Advantage / Secrecy / Proxy re-encryption / Obfuscation / RSA / Encryption / Hardware obfuscation / Cryptography / Cyberwarfare / Ciphertext indistinguishability

Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:25:07
32Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
33Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
34Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
35Ciphertext / Cipher / RSA / Encryption / Key / Proxy re-encryption / Cryptography / ID-based encryption / Chosen-ciphertext attack

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
36Cryptographic hash function / Proxy re-encryption / Lattice problem / Digital signature / NTRU / One-way function / Learning with errors / RSA / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Public-key cryptography

Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2011-01-31 08:38:01
37Advantage / Chosen-ciphertext attack / Semantic security / Ciphertext / Chosen-plaintext attack / Cipher / ElGamal encryption / Cryptography / Public-key cryptography / Proxy re-encryption

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-12-07 02:49:54
38Information society / Homomorphic encryption / Probabilistic encryption / Proxy re-encryption / ElGamal encryption / Ciphertext / Blind signature / RSA / Prêt à Voter / Cryptography / Public-key cryptography / Electronic voting

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
39Block cipher / RSA / Ciphertext stealing / Proxy re-encryption / Cryptography / Ciphertext / Cipher

CS255: Cryptography and Computer Security Winter 2012 Assignment #1 Due: Wednesday, Feb. 1, 2012, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-01-31 13:48:13
UPDATE