International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
Eprint
https://eprint.iacr.org/2005/433
Giuseppe Ateniese Susan Hohenberger
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed proxy re-signatures, in which a semi-trusted proxy acts as a translator between Alice and Bob. To translate, the proxy converts a signature from Alice into a signature from...
received 28 Nov 2005
Proxy Re-Encryption and Re-Signatures from Lattices
Eprint
https://eprint.iacr.org/2017/456
Xiong Fan Feng-Hao Liu
Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt '98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an...
last revised 27 Jan 2018
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Eprint
https://eprint.iacr.org/2005/028
Giuseppe Ateniese Kevin Fu Matthew Green Susan Hohenberger
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying...
last revised 11 Jan 2006
Key-Private Proxy Re-Encryption
Eprint
https://eprint.iacr.org/2008/463
Giuseppe Ateniese Karyn Benson Susan Hohenberger
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to...
last revised 22 Jan 2009
Chosen-Ciphertext Secure Proxy Re-Encryption
Eprint
https://eprint.iacr.org/2007/171
Ran Canetti Susan Hohenberger
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however,...
last revised 29 Oct 2007
Strongly Unforgeable Proxy Re-Signatures in the Standard Model
Eprint
https://eprint.iacr.org/2012/080
S. Sree Vivek S. Sharmila Deva Selvi Guhan Balasubramanian C. Pandu Rangan
Proxy re-signatures are generally used for the delegation of signing rights of a user (delegator) to a semi- trusted proxy and a delegatee. The proxy can convert the signature of one user on a message into the signature of...
last revised 24 Nov 2013
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Eprint
https://eprint.iacr.org/2010/422
Jae Hyun Ahn Matthew Green Susan Hohenberger
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signature. Unfortunately, no ``fully...
received 29 Jul 2010
New Definitions and Separations for Circular Security
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=24346
David Cash Matthew Green Susan Hohenberger
Pkc 2012
Practical Group Signatures without Random Oracles
Eprint
https://eprint.iacr.org/2005/385
Giuseppe Ateniese Jan Camenisch Susan Hohenberger Breno de Medeiros
We provide a construction for a group signature scheme that is provably secure in a universally composable framework, within the standard model with trusted parameters. Our proposed scheme is fairly simple and its efficiency...
last revised 24 Aug 2006
Giuseppe Ateniese
Author
https://iacr.org/cryptodb/data/author.php?authorkey=115
Johns Hopkins University
Identity-Based Proxy Re-encryption
Eprint
https://eprint.iacr.org/2006/473
Matthew Green Giuseppe Ateniese
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob {\em without} seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting....
received 15 Dec 2006
Subversion-Resilient Signatures: Definitions, Constructions and Applications
Eprint
https://eprint.iacr.org/2015/517
Giuseppe Ateniese Bernardo Magri Daniele Venturi
We provide a formal treatment of security of digital signatures against subversion attacks (SAs). Our model of subversion generalizes previous work in several directions, and is inspired by the proliferation of software...
last revised 3 Nov 2018
Susan Hohenberger
Author
https://iacr.org/cryptodb/data/author.php?authorkey=587
Johns Hopkins University
IACR EUROCRYPT 2004 External Reviewers
https://iacr.org/archive/eurocrypt2004/external.html
IACR EUROCRYPT 2004 External Reviewers Adi Akavia Joy Algesheimer Jee Hea An Siddhartha Annapureddy Giuseppe Ateniese Endre Bangerter Lejla Batina Amos Beimel Mihir Bellare Siddika Berna Ors Simon Blackburn Carlo Blundo...
New Definitions and Separations for Circular Security
Eprint
https://eprint.iacr.org/2010/144
David Cash Matthew Green Susan Hohenberger
Traditional definitions of encryption security guarantee secrecy for any plaintext that can be computed by an outside adversary. In some settings, such as anonymous credential or disk encryption systems, this is not enough,...
last revised 9 May 2012
IACR PKC 2014
https://iacr.org/archive/pkc2014/pkc2014-index.html
PKC 2014: Hugo Krawczyk (Ed.): Public-Key Cryptography - PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography Buenos Aires, Argentina, March 26-28, 2014 Proceedings. PKC 2014 Argentina,...
External Reviewers, IACR EUROCRYPT 2010
https://iacr.org/archive/eurocrypt2010/external.html
External Reviewers, IACR EUROCRYPT 2010 Michel Abdalla Masayuki Abe Shweta Agrawal Martin Albrecht Davide Alessio Elena Andreeva Giuseppe Ateniese Roberto Avanzi Ali Bagherzandi Paulo Barreto Anja Becker Mihir Bellare Rikke...
External Reviewers, IACR Eurocrypt 2012
https://iacr.org/archive/eurocrypt2012/external.html
External Reviewers, IACR Eurocrypt 2012 Michel Abdalla Adi Akavia Joël Alwen Elena Andreeva Giuseppe Ateniese Nuttapong Attrapadung Man Ho Au Paul Baecher Thomas Baignères Foteini Baldimtsi Paulo Barreto Aurélie Bauer...
IACR Eurocrypt 2008, External Reviewers
https://iacr.org/archive/eurocrypt2008/external.html
IACR Eurocrypt 2008, External Reviewers Michel Abdalla Masayuki Abe Omran Ahmadi Elena Andreeva Kazumaro Aoki Frederik Armknecht Giuseppe Ateniese Nuttapong Attrapadung Roberto Avanzi Mira Belenkiy Côme Berbain Guido Blady...
Non-Transferable Proxy Re-Encryption
Eprint
https://eprint.iacr.org/2015/1216
Hui Guo Zhenfeng Zhang Jing Xu
Proxy re-encryption (PRE) allows a semi-trusted proxy to transform a ciphertext for Alice into a ciphertext of the same message for Bob. The traditional security notion of PRE focuses on preventing the proxy with the...
last revised 21 May 2016
Next ►