Sciweavers

31 search results - page 1 / 7
» Structured Encryption and Controlled Disclosure
Sort
View
ASIACRYPT
2010
Springer
13 years 2 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
IEEEMSP
2002
IEEE
121views Multimedia» more  IEEEMSP 2002»
13 years 9 months ago
Communication-friendly encryption of multimedia
Abstract— This paper discusses encryption operations that selectively encrypt content-carrying segments of multimedia data stream. We propose and analyze three techniques that wo...
Min Wu, Yinian Mao
CCS
2006
ACM
13 years 8 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 1 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
PST
2004
13 years 6 months ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams