Sciweavers

32 search results - page 7 / 7
» Hiding the Policy in Cryptographic Access Control
Sort
View
116
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 12 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CCS
2007
ACM
15 years 8 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee