Year |
Citation |
Score |
2014 |
Akinyele JA, Green M, Hohenberger S, Pagano M. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes Journal of Computer Security. 22: 867-912. DOI: 10.3233/JCS-140507 |
0.332 |
|
2014 |
Hohenberger S, Waters B. Online/offline attribute-based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8383: 293-310. DOI: 10.1007/978-3-642-54631-0_17 |
0.304 |
|
2013 |
Hohenberger S, Waters B. Attribute-based encryption with fast decryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 162-179. DOI: 10.1007/978-3-642-36362-7_11 |
0.41 |
|
2012 |
Akinyele JA, Green M, Hohenberger S, Pagano MW. Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes Proceedings of the Acm Conference On Computer and Communications Security. 474-487. DOI: 10.3233/Jcs-140507 |
0.401 |
|
2012 |
Cash D, Green M, Hohenberger S. New definitions and separations for circular security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 540-557. DOI: 10.1007/978-3-642-30057-8_32 |
0.321 |
|
2012 |
Hohenberger S, Lewko A, Waters B. Detecting dangerous queries: A new approach for chosen ciphertext security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 663-681. DOI: 10.1007/978-3-642-29011-4_39 |
0.374 |
|
2011 |
Coull SE, Green M, Hohenberger S. Access controls for oblivious and anonymous systems Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952992 |
0.482 |
|
2011 |
Hohenberger S, Rothblum GN, Shelat A, Vaikuntanathan V. Securely obfuscating re-encryption Journal of Cryptology. 24: 694-719. DOI: 10.1007/S00145-010-9077-7 |
0.428 |
|
2009 |
Ferrara AL, Green M, Hohenberger S, Pedersen MO. Practical short signature batch verification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 309-324. DOI: 10.1007/978-3-642-00862-7_21 |
0.323 |
|
2009 |
Ateniese G, Benson K, Hohenberger S. Key-private proxy re-encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 279-294. DOI: 10.1007/978-3-642-00862-7_19 |
0.448 |
|
2009 |
Coull S, Green M, Hohenberger S. Controlling access to an oblivious database using stateful anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5443: 501-520. DOI: 10.1007/978-3-642-00468-1_28 |
0.392 |
|
2007 |
Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption Proceedings of the Acm Conference On Computer and Communications Security. 185-194. DOI: 10.1145/1315245.1315269 |
0.447 |
|
2007 |
Camenisch J, Hohenberger S, Pedersen MØ. Batch verification of short signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 246-263. DOI: 10.1007/S00145-011-9108-Z |
0.456 |
|
2007 |
Green M, Hohenberger S. Blind identity-based encryption and simulatable oblivious transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4833: 265-282. |
0.451 |
|
2006 |
Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: Efficient periodic n-times anonymous authentication Proceedings of the Acm Conference On Computer and Communications Security. 201-210. DOI: 10.1145/1180405.1180431 |
0.563 |
|
2006 |
Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage Acm Transactions On Information and System Security. 9: 1-30. DOI: 10.1145/1127345.1127346 |
0.506 |
|
2006 |
Hohenberger S, Weis SA. Honest-verifier private disjointness testing without random oracles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 277-294. DOI: 10.1007/11957454_16 |
0.345 |
|
2006 |
Adida B, Chau D, Hohenberger S, Rivest RL. Lightweight email signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 288-302. |
0.41 |
|
2006 |
Camenisch J, Hohenberger S, Lysyanskaya A. Balancing accountability and privacy using E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 141-155. |
0.589 |
|
2005 |
Ateniese G, Hohenberger S. Proxy re-signatures: New definitions, algorithms, and applications Proceedings of the Acm Conference On Computer and Communications Security. 310-319. DOI: 10.1145/1102120.1102161 |
0.434 |
|
2005 |
Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations Lecture Notes in Computer Science. 3378: 264-282. |
0.558 |
|
Show low-probability matches. |