Sciweavers

2108 search results - page 1 / 422
» Encrypted
Sort
View
SEMWEB
2005
Springer
14 years 2 months ago
On Partial Encryption of RDF-Graphs
In this paper a method for Partial RDF Encryption (PRE) is proposed in which sensitive data in an RDF-graph is encrypted for a set of recipients while all non-sensitive data remain...
Mark Giereth
IEEEMSP
2002
IEEE
121views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Communication-friendly encryption of multimedia
Abstract— This paper discusses encryption operations that selectively encrypt content-carrying segments of multimedia data stream. We propose and analyze three techniques that wo...
Min Wu, Yinian Mao
AAECC
2009
Springer
138views Algorithms» more  AAECC 2009»
14 years 17 days ago
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Abstract. We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) ...
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki ...
EUROCRYPT
2008
Springer
13 years 10 months ago
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Predicate encryption is a new paradigm for public-key encryption generalizing, among other things, identity-based encryption. In a predicate encryption scheme, secret keys corresp...
Jonathan Katz, Amit Sahai, Brent Waters
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
13 years 6 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome