Sciweavers

4 search results - page 1 / 1
» Public-Key Encryption with Efficient Amortized Updates
Sort
View
SCN
2010
Springer
113views Communications» more  SCN 2010»
13 years 2 months ago
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
FC
2006
Springer
147views Cryptology» more  FC 2006»
13 years 8 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
CCS
2008
ACM
13 years 6 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
TCS
2008
13 years 4 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...