Improved proxy re-encryption schemes with applications to secure distributed storage G Ateniese, K Fu, M Green, S Hohenberger ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006 | 1986 | 2006 |
Outsourcing the decryption of abe ciphertexts. M Green, S Hohenberger, B Waters USENIX security symposium 2011 (3), 2011 | 961 | 2011 |
Chosen-ciphertext secure proxy re-encryption R Canetti, S Hohenberger Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 670 | 2007 |
Compact e-cash J Camenisch, S Hohenberger, A Lysyanskaya Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 584 | 2005 |
How to securely outsource cryptographic computations S Hohenberger, A Lysyanskaya Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 458 | 2005 |
How to win the clonewars: efficient periodic n-times anonymous authentication J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ... Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 313 | 2006 |
Online/offline attribute-based encryption S Hohenberger, B Waters Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 310 | 2014 |
Attribute-based encryption with fast decryption S Hohenberger, B Waters Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 306 | 2013 |
Practical short signature batch verification AL Ferrara, M Green, S Hohenberger, MØ Pedersen Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009 | 283 | 2009 |
Key-private proxy re-encryption G Ateniese, K Benson, S Hohenberger Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009 | 269 | 2009 |
Proxy re-signatures: new definitions, algorithms, and applications G Ateniese, S Hohenberger Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 233 | 2005 |
Securely obfuscating re-encryption S Hohenberger, GN Rothblum, A Shelat, V Vaikuntanathan Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 223 | 2007 |
Batch verification of short signatures J Camenisch, S Hohenberger, MØ Pedersen Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 217 | 2007 |
Tetris is hard, even to approximate ED Demaine, S Hohenberger, D Liben-Nowell COCOON, 351-363, 2003 | 201 | 2003 |
Blind identity-based encryption and simulatable oblivious transfer M Green, S Hohenberger Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 177 | 2007 |
Computing on authenticated data JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters Journal of Cryptology 28 (2), 351-395, 2015 | 175 | 2015 |
Short and Stateless Signatures from the RSA Assumption. S Hohenberger, B Waters Crypto 5677, 654-670, 2009 | 174 | 2009 |
Practical group signatures without random oracles G Ateniese, J Camenisch, S Hohenberger, B De Medeiros Cryptology ePrint Archive, 2005 | 166 | 2005 |
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures S Hohenberger, A Sahai, B Waters Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 128 | 2013 |
Universally composable adaptive oblivious transfer M Green, S Hohenberger Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008 | 126 | 2008 |