Sciweavers

Share
41 search results - page 8 / 9
» Threshold Encryption into Multiple Ciphertexts
Sort
View
IEEECIT
2010
IEEE
11 years 4 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
VLDB
2007
ACM
155views Database» more  VLDB 2007»
12 years 7 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
IJISEC
2010
87views more  IJISEC 2010»
11 years 5 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
12 years 3 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no eļ¬ƒcient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis
ACNS
2005
Springer
84views Cryptology» more  ACNS 2005»
12 years 8 days ago
Non-interactive Zero-Knowledge Arguments for Voting
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends it in to the authorities that tally the votes. If voters can send in arbitrary ...
Jens Groth
books