We propose the first fully homomorphic encryption scheme, solving an old open problem. Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a program (or circuit) P and produces a new program O (P) that has the same functionality as …
R Canetti, S Hohenberger - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different …
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a program (or circuit) P and produces a new program O (P) that has the same functionality as …
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …
J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …
M Van Dijk, A Juels - 5th USENIX Workshop on Hot Topics in Security …, 2010 - usenix.org
Cloud computing denotes an architectural shift toward thin clients and conveniently centralized provision of computing resources. Clients' lack of direct resource control in the …
B Libert, D Vergnaud - Public Key Cryptography–PKC 2008: 11th …, 2008 - Springer
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms–without seeing the corresponding plaintext …
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as …