Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Gay, Romain"'
Machine learning on encrypted data has received a lot of attention thanks to recent breakthroughs in homomorphic encryption and secure multi-party computation. It allows outsourcing computation to untrusted servers without sacrificing privacy of sens
Externí odkaz:
http://arxiv.org/abs/1905.10214
Autor:
Gay, Romain
Publikováno v:
Cryptography and Security [cs.CR]. PSL Research University, 2019. English
Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2019. English. ⟨NNT : 2019PSLEE078⟩
Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2019. English. ⟨NNT : 2019PSLEE078⟩
Our work revisits public-key encryption in two ways: 1) we provide stronger security guarantee that typical public-key encryption, which handles many users than can collude to perform sophisticated attacks. This is necessary when considering widely d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::20d3c0852224825c648786cf143485b0
https://tel.archives-ouvertes.fr/tel-02137987
https://tel.archives-ouvertes.fr/tel-02137987
Autor:
Gay, Romain
Publikováno v:
Cryptography and Security [cs.CR]. PSL Research University, 2019. English
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee than typical public-key encryption, which handles many users than can collude to perform sophisticated attacks. This is necessary when considering widely
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::87a9c75c7b662eda53964a26b6c2edc1
https://tel.archives-ouvertes.fr/tel-02137987
https://tel.archives-ouvertes.fr/tel-02137987
Publikováno v:
Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory & Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I; 2016, p1-27, 27p
Publikováno v:
Advances in Cryptology, Crypto 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II; 2015, p485-502, 18p
Publikováno v:
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory & Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II; 2015, p595-624, 30p
Publikováno v:
Public-Key Cryptography -- PKC 2015; 2015, p752-776, 25p
Publikováno v:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::41a5b6f8318b73eff0f353ec593675f5
Publikováno v:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security-CCS 17
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17
ACM Conference on Computer and Communications Security (CCS) 2017
ACM Conference on Computer and Communications Security (CCS) 2017, Oct 2017, Dallas, United States
CCS
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17
ACM Conference on Computer and Communications Security (CCS) 2017
ACM Conference on Computer and Communications Security (CCS) 2017, Oct 2017, Dallas, United States
CCS
Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted data, making it an appealing building block for many applications. In this paper, we propose, implement, and evaluate fully automate