Susan Hohenberger
Susan Hohenberger
Bestätigte E-Mail-Adresse bei cs.jhu.edu
Titel
Zitiert von
Zitiert von
Jahr
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
17342006
Outsourcing the decryption of abe ciphertexts.
M Green, S Hohenberger, B Waters
USENIX security symposium 2011 (3), 2011
7442011
Chosen-ciphertext secure proxy re-encryption
R Canetti, S Hohenberger
Proceedings of the 14th ACM conference on Computer and communications …, 2007
6002007
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Annual International Conference on the Theory and Applications of …, 2005
4942005
How to securely outsource cryptographic computations
S Hohenberger, A Lysyanskaya
Theory of cryptography conference, 264-282, 2005
4002005
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2842006
Attribute-based encryption with fast decryption
S Hohenberger, B Waters
International workshop on public key cryptography, 162-179, 2013
2652013
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MØ Pedersen
Cryptographers’ Track at the RSA Conference, 309-324, 2009
2522009
Key-private proxy re-encryption
G Ateniese, K Benson, S Hohenberger
Cryptographers’ Track at the RSA Conference, 279-294, 2009
2292009
Online/offline attribute-based encryption
S Hohenberger, B Waters
International workshop on public key cryptography, 293-310, 2014
2262014
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, V Vaikuntanathan
Theory of Cryptography Conference, 233-252, 2007
2162007
Proxy re-signatures: new definitions, algorithms, and applications
G Ateniese, S Hohenberger
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2122005
Batch verification of short signatures
J Camenisch, S Hohenberger, MØ Pedersen
Annual International Conference on the Theory and Applications of …, 2007
1942007
Tetris is hard, even to approximate
ED Demaine, S Hohenberger, D Liben-Nowell
International Computing and Combinatorics Conference, 351-363, 2003
1762003
Blind identity-based encryption and simulatable oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2007
1642007
Short and stateless signatures from the RSA assumption
S Hohenberger, B Waters
Annual International Cryptology Conference, 654-670, 2009
1602009
Practical group signatures without random oracles
G Ateniese, J Camenisch, S Hohenberger, B De Medeiros
Cryptology ePrint Archive, 2005
1422005
Universally composable adaptive oblivious transfer
M Green, S Hohenberger
International Conference on the Theory and Application of Cryptology and …, 2008
1202008
Realizing hash-and-sign signatures under standard assumptions
S Hohenberger, B Waters
Annual International Conference on the Theory and Applications of …, 2009
1182009
Replacing a random oracle: Full domain hash from indistinguishability obfuscation
S Hohenberger, A Sahai, B Waters
Annual International Conference on the Theory and Applications of …, 2014
1132014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20