Public key encryption with keyword search
We study the problem of searching on data that is encrypted using a public key system.
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
Consider user Bob who sends email to user Alice encrypted under Alice's public key. An …
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green… - ACM Transactions on …, 2006 - dl.acm.org
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …
privacy. First, our increasing reliance on Web services causes personal data to be cached …
Certificate-based encryption and the certificate revocation problem
C Gentry - International Conference on the Theory and …, 2003 - Springer
We introduce the notion of certificate-based encryption. In this model, a certificate—or, more
generally, a signature—acts not only as a certificate but also as a decryption key. To decrypt …
generally, a signature—acts not only as a certificate but also as a decryption key. To decrypt …
FlipIt: The Game of “Stealthy Takeover”
Recent targeted attacks have increased significantly in sophistication, undermining the
fundamental assumptions on which most cryptographic primitives rely for security. For …
fundamental assumptions on which most cryptographic primitives rely for security. For …
Enabling cloud storage auditing with key-exposure resistance
Cloud storage auditing is viewed as an important service to verify the integrity of the data in
public cloud. Current auditing protocols are all based on the assumption that the client's …
public cloud. Current auditing protocols are all based on the assumption that the client's …
Functional encryption with bounded collusions via multi-party computation
We construct functional encryption schemes for polynomial-time computable functions
secure against an a-priori bounded polynomial number of collusions. Our constructions …
secure against an a-priori bounded polynomial number of collusions. Our constructions …
SGX-Log: Securing system logs with SGX
System logs are the greatest forensics assets that capture how an operating system or a
program behaves. System logs are often the next immediate attack target once a system is …
program behaves. System logs are often the next immediate attack target once a system is …
[PDF][PDF] Proxy Cryptography Revisited.
AA Ivan, Y Dodis - NDSS, 2003 - Citeseer
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …
Revocable identity-based encryption revisited: Security model and construction
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …