Sciweavers

2108 search results - page 58 / 422
» Encrypted
Sort
View
100
Voted
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
112
Voted
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
15 years 7 months ago
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Despite the rapid adoption of Voice over IP (VoIP), its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be enc...
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...
135
Voted
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 6 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
89
Voted
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
15 years 6 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
83
Voted
EUROCRYPT
2004
Springer
15 years 6 months ago
Public Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An ema...
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky...