Sciweavers

CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
13 years 9 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest