Sciweavers

91 search results - page 11 / 19
» Immunizing Encryption Schemes from Decryption Errors
Sort
View
IACR
2011
196views more  IACR 2011»
14 years 24 days ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 7 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
JCST
2010
147views more  JCST 2010»
14 years 8 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
CRYPTO
2001
Springer
162views Cryptology» more  CRYPTO 2001»
15 years 5 months ago
New Public Key Cryptosystem Using Finite Non Abelian Groups
Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. I...
Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongt...
SEC
2007
15 years 2 months ago
A Hybrid PKI-IBC Based Ephemerizer System
The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The princ...
Srijith Krishnan Nair, Muhammad Torabi Dashti, Bru...