Sciweavers

39 search results - page 3 / 8
» Rekeying and Storage Cost for Multiple User Revocation
Sort
View
DBSEC
2008
196views Database» more  DBSEC 2008»
14 years 11 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
JCP
2006
116views more  JCP 2006»
14 years 9 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
ICISC
2004
96views Cryptology» more  ICISC 2004»
14 years 10 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
CLOUD
2010
ACM
15 years 2 months ago
RACS: a case for cloud storage diversity
The increasing popularity of cloud storage is leading organizations to consider moving data out of their own data centers and into the cloud. However, success for cloud storage pr...
Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weath...
ASIACRYPT
2001
Springer
15 years 1 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman