Sciweavers

332 search results - page 7 / 67
» Token-Controlled Public Key Encryption
Sort
View
IACR
2011
94views more  IACR 2011»
12 years 7 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
SCN
2010
Springer
113views Communications» more  SCN 2010»
13 years 5 months ago
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
13 years 11 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
CRYPTO
2008
Springer
80views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Dynamic Threshold Public-Key Encryption
Cécile Delerablée, David Pointcheval