Susan Hohenberger - Publications

Affiliations: 
Johns Hopkins University, Baltimore, MD 
Area:
Computer Science

21 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Akinyele JA, Green M, Hohenberger S, Pagano M. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes Journal of Computer Security. 22: 867-912. DOI: 10.3233/JCS-140507  0.332
2014 Hohenberger S, Waters B. Online/offline attribute-based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8383: 293-310. DOI: 10.1007/978-3-642-54631-0_17  0.304
2013 Hohenberger S, Waters B. Attribute-based encryption with fast decryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 162-179. DOI: 10.1007/978-3-642-36362-7_11  0.41
2012 Akinyele JA, Green M, Hohenberger S, Pagano MW. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes Proceedings of the Acm Conference On Computer and Communications Security. 474-487. DOI: 10.3233/Jcs-140507  0.401
2012 Cash D, Green M, Hohenberger S. New definitions and separations for circular security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 540-557. DOI: 10.1007/978-3-642-30057-8_32  0.321
2012 Hohenberger S, Lewko A, Waters B. Detecting dangerous queries: A new approach for chosen ciphertext security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 663-681. DOI: 10.1007/978-3-642-29011-4_39  0.374
2011 Coull SE, Green M, Hohenberger S. Access controls for oblivious and anonymous systems Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952992  0.482
2011 Hohenberger S, Rothblum GN, Shelat A, Vaikuntanathan V. Securely obfuscating re-encryption Journal of Cryptology. 24: 694-719. DOI: 10.1007/S00145-010-9077-7  0.428
2009 Ferrara AL, Green M, Hohenberger S, Pedersen MO. Practical short signature batch verification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 309-324. DOI: 10.1007/978-3-642-00862-7_21  0.323
2009 Ateniese G, Benson K, Hohenberger S. Key-private proxy re-encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 279-294. DOI: 10.1007/978-3-642-00862-7_19  0.448
2009 Coull S, Green M, Hohenberger S. Controlling access to an oblivious database using stateful anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5443: 501-520. DOI: 10.1007/978-3-642-00468-1_28  0.392
2007 Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption Proceedings of the Acm Conference On Computer and Communications Security. 185-194. DOI: 10.1145/1315245.1315269  0.447
2007 Camenisch J, Hohenberger S, Pedersen MØ. Batch verification of short signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 246-263. DOI: 10.1007/S00145-011-9108-Z  0.456
2007 Green M, Hohenberger S. Blind identity-based encryption and simulatable oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4833: 265-282.  0.451
2006 Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: Efficient periodic n-times anonymous authentication Proceedings of the Acm Conference On Computer and Communications Security. 201-210. DOI: 10.1145/1180405.1180431  0.563
2006 Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage Acm Transactions On Information and System Security. 9: 1-30. DOI: 10.1145/1127345.1127346  0.506
2006 Hohenberger S, Weis SA. Honest-verifier private disjointness testing without random oracles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 277-294. DOI: 10.1007/11957454_16  0.345
2006 Adida B, Chau D, Hohenberger S, Rivest RL. Lightweight email signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 288-302.  0.41
2006 Camenisch J, Hohenberger S, Lysyanskaya A. Balancing accountability and privacy using E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 141-155.  0.589
2005 Ateniese G, Hohenberger S. Proxy re-signatures: New definitions, algorithms, and applications Proceedings of the Acm Conference On Computer and Communications Security. 310-319. DOI: 10.1145/1102120.1102161  0.434
2005 Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations Lecture Notes in Computer Science. 3378: 264-282.  0.558
Show low-probability matches.