<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher
Cryptography
Public-key cryptography
Key management
Public key infrastructure
Proxy re-encryption
Identity-based cryptography
Encryption
Symmetric-key algorithm
Key generation
Integrated Encryption Scheme
Hybrid cryptosystem
Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Download Document from Source Website

File Size: 610,77 KB

Share Document on Facebook

Similar Documents

D:/Documents/Courses/Winter 2014/aez/rae.dvi

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Microsoft Word - nljul2005_2_.doc

Microsoft Word - nljul2005_2_.doc

DocID: 1giRn - View Document

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin  Alina Oprea

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

DocID: 1apk7 - View Document

CODING CONCEPTS  TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

DocID: 18EFF - View Document

CSCI-GAMATH-GAIntroduction to Cryptography  April 25, 2012

CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012

DocID: 13Khz - View Document