• Publications
  • Influence
Improved proxy re-encryption schemes with applications to secure distributed storage
TLDR
We present new re-encryption schemes that realize a stronger notion of security and demonstrate the usefulness of proxy re-Encryption as a method of adding access control to a secure file system. Expand
  • 1,373
  • 106
  • PDF
Identity-Based Proxy Re-encryption
TLDR
We address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identityto another without seeing the underlying plaintext. Expand
  • 518
  • 76
  • PDF
Outsourcing the Decryption of ABE Ciphertexts
TLDR
We show how a user can provide the cloud with a single transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes into a (constant-size) El Gamal-style ciphertext, without the cloud being able to read any part of the messages. Expand
  • 566
  • 68
  • PDF
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
TLDR
In this paper we propose Zerocoin, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions. Expand
  • 667
  • 49
  • PDF
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
TLDR
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. Expand
  • 327
  • 30
  • PDF
Bolt: Anonymous Payment Channels for Decentralized Currencies
TLDR
We introduce techniques for constructing anonymous payment channels, including a technique that allows payments via untrusted intermediaries. Expand
  • 141
  • 17
  • PDF
Developers are Not the Enemy!: The Need for Usable Security APIs
TLDR
We show that developers aren't the enemy and that, to strengthen security systems across the board, security professionals must focus on creating developer-friendly and developer-centric approaches. Expand
  • 91
  • 14
  • PDF
Forward Secure Asynchronous Messaging from Puncturable Encryption
TLDR
In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems. Expand
  • 61
  • 14
  • PDF
Practical Short Signature Batch Verification
TLDR
In many applications, it is desirable to work with signatures that are short, and yet where many messages from different signers be verified very quickly. Expand
  • 218
  • 13
  • PDF
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
TLDR
In an identity-based encryption (IBE) scheme, there is a key extraction protocol where a user submits an identity string to a master authority who then returns the corresponding secret key for that identity without the master authority learning anything about this identity. Expand
  • 143
  • 13
  • PDF