Back to Results
First PageMeta Content
Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography


Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea
Add to Reading List

Document Date: 2005-09-02 12:11:39


Open Document

File Size: 109,29 KB

Share Result on Facebook

Company

AES / Cryptographic File Systems / Storage Area Networks / IBM / /

/

IndustryTerm

verification algorithm / deterministic polynomial-time algorithms / probabilistic polynomial-time algorithm / deterministic decryption algorithm / probabilistic encryption algorithm / verification algorithms / pseudo-random function applications / diverse solutions / decryption algorithm / data storage systems / public-key infrastructure / file systems / update algorithm / user key derivation algorithm / extraction algorithm / deterministic algorithms / direct applications / polynomial-time algorithms / storage solutions / probabilistic tagging algorithm / deterministic verification algorithm / decryption algorithms / storage systems / deterministic initialization algorithms / recent systems / polynomial-time adversary algorithm / initialization algorithm / authentication algorithms / computing / trusted key server / encryption algorithm / /

OperatingSystem

Unix / /

Person

Michael Backes Christian Cachin Alina / Christian Cachin Alina Oprea / /

Position

cpa-lr AdvE lr cpa / cpa / /

Product

CH-8803 R / /

ProvinceOrState

Massachusetts / /

Technology

polynomial-time adversary algorithm / three algorithms / secret-key encryption / 3 Symmetric Encryption / probabilistic tagging algorithm / namely symmetric encryption / authentication algorithms / Derivelr algorithms / tagging algorithm / Derive algorithms / key extraction algorithm / verification algorithms / corresponding algorithms / Unix / encryption algorithm / symmetric-key encryption / probabilistic encryption algorithm / block cipher / Extract algorithms / secret key / decryption algorithms / Gen algorithm / public-key infrastructure / Init algorithm / two algorithms / four deterministic polynomial-time algorithms / user key derivation algorithm / encryption / file data encryption / deterministic verification algorithm / five polynomial-time algorithms / public key / deterministic decryption algorithm / verification algorithm / key update algorithm / probabilistic polynomial-time algorithm / simulation / decryption algorithm / deterministic initialization algorithms / initialization algorithm / /

SocialTag