System and method for secure three-party communications

DP Felsher, RH Nagel, SM Hoffberg - US Patent 8,316,237, 2012 - Google Patents
(57) ABSTRACT A system and method for communicating information between a first party
and a second party, comprising the steps of receiving, by an intermediary, an identifier of …

[图书][B] A fully homomorphic encryption scheme

C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …

On the (im) possibility of obfuscating programs

B Barak, O Goldreich, R Impagliazzo, S Rudich… - Annual international …, 2001 - Springer
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …

Chosen-ciphertext secure proxy re-encryption

R Canetti, S Hohenberger - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to
translate a ciphertext under one key into a ciphertext of the same message under a different …

On the (im) possibility of obfuscating programs

B Barak, O Goldreich, R Impagliazzo, S Rudich… - Journal of the ACM …, 2012 - dl.acm.org
Informally, an obfuscator O is an (efficient, probabilistic)“compiler” that takes as input a
program (or circuit) P and produces a new program O (P) that has the same functionality as …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

CCA-secure proxy re-encryption without pairings

J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …

[PDF][PDF] On the impossibility of cryptography alone for {Privacy-Preserving} cloud computing

M Van Dijk, A Juels - 5th USENIX Workshop on Hot Topics in Security …, 2010 - usenix.org
Cloud computing denotes an architectural shift toward thin clients and conveniently
centralized provision of computing resources. Clients' lack of direct resource control in the …

Unidirectional chosen-ciphertext secure proxy re-encryption

B Libert, D Vergnaud - Public Key Cryptography–PKC 2008: 11th …, 2008 - Springer
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called
proxy re-encryption, in which a proxy transforms–without seeing the corresponding plaintext …

Key-private proxy re-encryption

G Ateniese, K Benson, S Hohenberger - … in Cryptology–CT-RSA 2009: The …, 2009 - Springer
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key
into an encryption of the same message under another key. The main idea is to place as …