Sciweavers

213 search results - page 19 / 43
» Can Homomorphic Encryption be Practical
Sort
View
EUROCRYPT
2010
Springer
14 years 4 days ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
IACR
2011
89views more  IACR 2011»
12 years 7 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 11 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
ICEBE
2007
IEEE
123views Business» more  ICEBE 2007»
13 years 7 months ago
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...
Sergei Evdokimov, Oliver Günther
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
12 years 10 months ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...