Volgen
Susan Hohenberger
Susan Hohenberger
Geverifieerd e-mailadres voor cs.jhu.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
19862006
Outsourcing the decryption of abe ciphertexts.
M Green, S Hohenberger, B Waters
USENIX security symposium 2011 (3), 2011
9612011
Chosen-ciphertext secure proxy re-encryption
R Canetti, S Hohenberger
Proceedings of the 14th ACM conference on Computer and communications …, 2007
6702007
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
5842005
How to securely outsource cryptographic computations
S Hohenberger, A Lysyanskaya
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
4582005
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3132006
Online/offline attribute-based encryption
S Hohenberger, B Waters
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
3102014
Attribute-based encryption with fast decryption
S Hohenberger, B Waters
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
3062013
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MŲ Pedersen
Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009
2832009
Key-private proxy re-encryption
G Ateniese, K Benson, S Hohenberger
Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009
2692009
Proxy re-signatures: new definitions, algorithms, and applications
G Ateniese, S Hohenberger
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2332005
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, A Shelat, V Vaikuntanathan
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
2232007
Batch verification of short signatures
J Camenisch, S Hohenberger, MŲ Pedersen
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
2172007
Tetris is hard, even to approximate
ED Demaine, S Hohenberger, D Liben-Nowell
COCOON, 351-363, 2003
2012003
Blind identity-based encryption and simulatable oblivious transfer
M Green, S Hohenberger
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1772007
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Journal of Cryptology 28 (2), 351-395, 2015
1752015
Short and Stateless Signatures from the RSA Assumption.
S Hohenberger, B Waters
Crypto 5677, 654-670, 2009
1742009
Practical group signatures without random oracles
G Ateniese, J Camenisch, S Hohenberger, B De Medeiros
Cryptology ePrint Archive, 2005
1662005
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
S Hohenberger, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1282013
Universally composable adaptive oblivious transfer
M Green, S Hohenberger
Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008
1262008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20