Sciweavers

1162 search results - page 5 / 233
» An implementable scheme for secure delegation of computing a...
Sort
View
CACM
2010
117views more  CACM 2010»
13 years 7 months ago
Computing arbitrary functions of encrypted data
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorph...
Craig Gentry
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 4 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
PET
2009
Springer
14 years 1 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
TC
2010
13 years 1 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
CCS
2010
ACM
13 years 7 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu