Sciweavers

357 search results - page 6 / 72
» Distributed Attribute-Based Encryption
Sort
View
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
126
Voted
JCP
2006
94views more  JCP 2006»
15 years 2 months ago
Broadcast Encryption Using Probabilistic Key Distribution and Applications
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution are proposed, that enable multiple sources to broadcast secrets, without the use of asymm...
Mahalingam Ramkumar
124
Voted
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
15 years 5 days ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
IACR
2011
130views more  IACR 2011»
14 years 2 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
134
Voted
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 4 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart