Sciweavers

91 search results - page 11 / 19
» Immunizing Encryption Schemes from Decryption Errors
Sort
View
IACR
2011
196views more  IACR 2011»
13 years 9 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 4 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
JCST
2010
147views more  JCST 2010»
14 years 4 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
CRYPTO
2001
Springer
162views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
New Public Key Cryptosystem Using Finite Non Abelian Groups
Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. I...
Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongt...
SEC
2007
14 years 11 months ago
A Hybrid PKI-IBC Based Ephemerizer System
The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The princ...
Srijith Krishnan Nair, Muhammad Torabi Dashti, Bru...