Sciweavers

91 search results - page 3 / 19
» Immunizing Encryption Schemes from Decryption Errors
Sort
View
126
Voted
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 11 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 7 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
133
Voted
IACR
2011
115views more  IACR 2011»
14 years 21 days ago
Threshold Encryption into Multiple Ciphertexts
We propose (T, N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption ...
Martin Stanek
130
Voted
ASIACRYPT
2005
Springer
15 years 6 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
103
Voted
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 1 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...