Sciweavers

8 search results - page 1 / 2
» Private-Key Hidden Vector Encryption with Key Confidentialit...
Sort
View
CANS
2009
Springer
115views Cryptology» more  CANS 2009»
15 years 5 months ago
Private-Key Hidden Vector Encryption with Key Confidentiality
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
ISW
2009
Springer
15 years 5 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
15 years 4 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
PROVSEC
2010
Springer
14 years 8 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...