Improved proxy re-encryption schemes with applications to secure distributed storage
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for …
[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …
privacy. First, our increasing reliance on Web services causes personal data to be cached …
Password-protected secret sharing
We revisit the problem of protecting user's private data against adversarial compromise of
user's device (s) which store this data. We formalize the solution we propose as Password …
user's device (s) which store this data. We formalize the solution we propose as Password …
Intrusion-resilience via the bounded-storage model
S Dziembowski - Theory of Cryptography Conference, 2006 - Springer
We introduce a new method of achieving intrusion-resilience in the cryptographic protocols.
More precisely we show how to preserve security of such protocols, even if a malicious …
More precisely we show how to preserve security of such protocols, even if a malicious …
Identity-based hierarchical strongly key-insulated encryption and its application
Y Hanaoka, G Hanaoka, J Shikata, H Imai - Advances in Cryptology …, 2005 - Springer
In this paper, we discuss non-interactive updating of decryption keys in identity-based
encryption (IBE). In practice, key revocation is a necessary and inevitable process and IBE is …
encryption (IBE). In practice, key revocation is a necessary and inevitable process and IBE is …
Encapsulation and decapsulation for data disintegration
A configuration for encapsulating data that is unreadable after a predetermined timeout. To
encapsulate data a random data key is generated and split into shares. A threshold number …
encapsulate data a random data key is generated and split into shares. A threshold number …
Parallel key-insulated public key encryption
G Hanaoka, Y Hanaoka, H Imai - Public Key Cryptography-PKC 2006: 9th …, 2006 - Springer
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution,
Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key …
Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key …
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
Revocation and key evolving paradigms are central issues in cryptography, and in PKI in
particular. A novel concern related to these areas was raised in the recent work of Sahai …
particular. A novel concern related to these areas was raised in the recent work of Sahai …
Secure key-updating for lazy revocation
We consider the problem of efficient key management and user revocation in cryptographic
file systems that allow shared access to files. A performance-efficient solution to user …
file systems that allow shared access to files. A performance-efficient solution to user …
Intrusion-resilient key exchange in the bounded retrieval model
We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE)
protocol in the bounded retrieval model. The model employs a long shared private key to …
protocol in the bounded retrieval model. The model employs a long shared private key to …