Proxy re-encryption

Results: 44



#Item
31Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum†  abhi shelat‡

Securely Obfuscating Re-Encryption Susan Hohenberger∗ Guy N. Rothblum† abhi shelat‡

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:25:07
32Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
33Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
34Pairing-based Cryptography:  Identity Based Encryption and Beyond

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
35Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 23:47:37
36Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Cryptography with Lattices 07D37042 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2011-01-31 08:38:01
37Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack ABSTRACT In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice’s public key into encr

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-12-07 02:49:54
38Chapter 69  Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Chapter 69 Verifiable Voting Systems Thea Peacock1 , Peter Y. A. Ryan1 , Steve Schneider2 and Zhe Xia2 1

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-06-27 03:06:06
39CS255: Cryptography and Computer Security  Winter 2012 Assignment #1 Due: Wednesday, Feb. 1, 2012, in class.

CS255: Cryptography and Computer Security Winter 2012 Assignment #1 Due: Wednesday, Feb. 1, 2012, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-01-31 13:48:13