팔로우
Susan Hohenberger
Susan Hohenberger
cs.jhu.edu의 이메일 확인됨
제목
인용
인용
연도
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
21652006
Outsourcing the decryption of {ABE} ciphertexts
M Green, S Hohenberger, B Waters
20th USENIX security symposium (USENIX Security 11), 2011
10722011
Chosen-ciphertext secure proxy re-encryption
R Canetti, S Hohenberger
Proceedings of the 14th ACM conference on Computer and communications …, 2007
7312007
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Annual International Conference on the Theory and Applications of …, 2005
6462005
How to securely outsource cryptographic computations
S Hohenberger, A Lysyanskaya
Theory of cryptography conference, 264-282, 2005
4982005
Online/offline attribute-based encryption
S Hohenberger, B Waters
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
3722014
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3512006
Attribute-based encryption with fast decryption
S Hohenberger, B Waters
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
3222013
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MØ Pedersen
Cryptographers’ Track at the RSA Conference, 309-324, 2009
3052009
Key-private proxy re-encryption
G Ateniese, K Benson, S Hohenberger
Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009
2982009
Proxy re-signatures: new definitions, algorithms, and applications
G Ateniese, S Hohenberger
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2552005
Batch verification of short signatures
J Camenisch, S Hohenberger, MØ Pedersen
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
2392007
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, A Shelat, V Vaikuntanathan
Theory of Cryptography Conference, 233-252, 2007
2372007
Tetris is hard, even to approximate
ED Demaine, S Hohenberger, D Liben-Nowell
Computing and Combinatorics: 9th Annual International Conference, COCOON …, 2003
2102003
Blind identity-based encryption and simulatable oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2007
1972007
Short and stateless signatures from the RSA assumption
S Hohenberger, B Waters
Annual International Cryptology Conference, 654-670, 2009
1902009
Practical group signatures without random oracles
G Ateniese, J Camenisch, S Hohenberger, B De Medeiros
Cryptology ePrint Archive, 2005
1812005
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Theory of Cryptography Conference, 1-20, 2012
1592012
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
S Hohenberger, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1412013
Balancing accountability and privacy using e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
International conference on security and cryptography for networks, 141-155, 2006
1382006
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20