Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Jeroen Pijnenburg"'
Autor:
Jeroen Pijnenburg, Bertram Poettering
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 2 (2020)
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetri
Externí odkaz:
https://doaj.org/article/7eb72672005b4d43a5ebb5a0e1e0522e
Autor:
Jeroen Pijnenburg, Bertram Poettering
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229688
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9192c31ddd40478554d8f531a3781f60
https://doi.org/10.1007/978-3-031-22969-5_4
https://doi.org/10.1007/978-3-031-22969-5_4
Autor:
Bertram Poettering, Jeroen Pijnenburg
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
ESORICS (1)
We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting oth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb854b3b38485263d1b375fa4f300192
https://doi.org/10.5281/zenodo.4146854
https://doi.org/10.5281/zenodo.4146854
Autor:
Bertram Poettering, Jeroen Pijnenburg
Publikováno v:
Proceedings of the 2nd Workshop on Cyber-Security Arms Race
CYSARM@CCS
CYSARM@CCS
Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4fca4ae2bb50f8f8b42f13bf079815fc