Index Terms
- Information systems outsourcing
Recommendations
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityOutsourcing the decryption of attribute-based encryption (ABE) ciphertext is a promising way to tackle the question of how users can perform decryption efficiently. However, existing solutions require the type of the target ciphertext to be determined ...
Delegatable homomorphic encryption with applications to secure outsourcing of computation
CT-RSA'12: Proceedings of the 12th conference on Topics in CryptologyWe propose a new cryptographic primitive called Delegatable Homomorphic Encryption (DHE). This allows a Trusted Authority to control/delegate the evaluation of circuits over encrypted data to untrusted workers/evaluators by issuing tokens. This ...
Comments