Improved proxy re-encryption schemes with applications to secure distributed storage

G Ateniese, K Fu, M Green… - ACM Transactions on …, 2006 - dl.acm.org
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …

[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.

R Geambasu, T Kohno, AA Levy, HM Levy - USENIX security symposium, 2009 - usenix.org
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …

Password-protected secret sharing

A Bagherzandi, S Jarecki, N Saxena, Y Lu - Proceedings of the 18th …, 2011 - dl.acm.org
We revisit the problem of protecting user's private data against adversarial compromise of
user's device (s) which store this data. We formalize the solution we propose as Password …

Intrusion-resilience via the bounded-storage model

S Dziembowski - Theory of Cryptography Conference, 2006 - Springer
We introduce a new method of achieving intrusion-resilience in the cryptographic protocols.
More precisely we show how to preserve security of such protocols, even if a malicious …

Identity-based hierarchical strongly key-insulated encryption and its application

Y Hanaoka, G Hanaoka, J Shikata, H Imai - Advances in Cryptology …, 2005 - Springer
In this paper, we discuss non-interactive updating of decryption keys in identity-based
encryption (IBE). In practice, key revocation is a necessary and inevitable process and IBE is …

Encapsulation and decapsulation for data disintegration

T Kohno, R Geambasu, HM Levy - US Patent 8,520,855, 2013 - Google Patents
A configuration for encapsulating data that is unreadable after a predetermined timeout. To
encapsulate data a random data key is generated and split into shares. A threshold number …

Parallel key-insulated public key encryption

G Hanaoka, Y Hanaoka, H Imai - Public Key Cryptography-PKC 2006: 9th …, 2006 - Springer
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution,
Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key …

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency

K Lee, SG Choi, DH Lee, JH Park, M Yung - … 1-5, 2013, Proceedings, Part I …, 2013 - Springer
Revocation and key evolving paradigms are central issues in cryptography, and in PKI in
particular. A novel concern related to these areas was raised in the recent work of Sahai …

Secure key-updating for lazy revocation

M Backes, C Cachin, A Oprea - … 11th European Symposium on Research in …, 2006 - Springer
We consider the problem of efficient key management and user revocation in cryptographic
file systems that allow shared access to files. A performance-efficient solution to user …

Intrusion-resilient key exchange in the bounded retrieval model

D Cash, YZ Ding, Y Dodis, W Lee, R Lipton… - Theory of Cryptography …, 2007 - Springer
We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE)
protocol in the bounded retrieval model. The model employs a long shared private key to …