Sciweavers

24188 search results - page 154 / 4838
» Computing on Encrypted Data
Sort
View
ER
2007
Springer
163views Database» more  ER 2007»
15 years 9 months ago
Know your Limits: Enhanced XML Modeling with Cardinality Constraints
XML Schema supports the specification of occurrence constraints by declaring values for its min/maxOccurs attributes. These constraints are structural in the sense that they rest...
Sebastian Link, Thu Trinh
SEC
2007
15 years 4 months ago
A Hybrid PKI-IBC Based Ephemerizer System
The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The princ...
Srijith Krishnan Nair, Muhammad Torabi Dashti, Bru...
ICIC
2009
Springer
15 years 9 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
ASIACRYPT
2007
Springer
15 years 9 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
FDTC
2007
Springer
105views Cryptology» more  FDTC 2007»
15 years 9 months ago
Tate Pairing with Strong Fault Resiliency
We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pai...
Erdinç Öztürk, Gunnar Gaubatz, Be...