His primary areas of study are Computer security, Cryptography, Ciphertext, Encryption and Random oracle. He interconnects Electronic money and Server in the investigation of issues within Computer security. In the field of Ciphertext, his study on Proxy re-encryption overlaps with subjects such as Proxy.
His Proxy re-encryption study incorporates themes from File system, Distributed data store and Access control. His research on Encryption often connects related areas such as Key. The Random oracle study combines topics in areas such as Theoretical computer science, Identity and Ring signature.
Matthew Green mostly deals with Computer security, Encryption, Cryptography, Theoretical computer science and Ciphertext. Matthew Green has researched Computer security in several fields, including Protocol and Internet privacy. His Attribute-based encryption study in the realm of Encryption connects with subjects such as Elliptic curve.
His Cryptography study combines topics from a wide range of disciplines, such as Python and Software. Matthew Green combines subjects such as Mathematical proof, Oblivious transfer, Digital signature, Random oracle and Hash function with his study of Theoretical computer science. His research in Ciphertext intersects with topics in Plaintext, Discrete mathematics and Standard model.
Matthew Green mainly focuses on Computer security, Mathematical proof, Theoretical computer science, Computation and Cryptography. His work on Encryption and Spoofing attack as part of his general Computer security study is frequently connected to Ledger, thereby bridging the divide between different branches of science. His work on Certificate transparency as part of general Encryption study is frequently linked to Function, bridging the gap between disciplines.
His Mathematical proof study combines topics in areas such as Correctness and Protocol. The study incorporates disciplines such as String and SNARK in addition to Theoretical computer science. His Cryptography research is multidisciplinary, incorporating elements of Test, Homomorphic encryption, Database transaction and Field.
Matthew Green focuses on Mathematical proof, Computer security, Computation, Theoretical computer science and Database transaction. His biological study deals with issues like Correctness, which deal with fields such as Proof assistant and Compiler. In his research, Matthew Green undertakes multidisciplinary study on Computer security and Ledger.
His Theoretical computer science research includes elements of String, Protocol and SNARK. His Database transaction research is multidisciplinary, incorporating perspectives in Distributed computing, Cryptography, Zero-knowledge proof, Cryptographic primitive and Byte. The Byte study combines topics in areas such as Scalability and State.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Zerocash: Decentralized Anonymous Payments from Bitcoin
Eli Ben Sasson;Alessandro Chiesa;Christina Garman;Matthew Green.
ieee symposium on security and privacy (2014)
Improved proxy re-encryption schemes with applications to secure distributed storage
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
I. Miers;C. Garman;M. Green;A. D. Rubin.
ieee symposium on security and privacy (2013)
Identity-Based Proxy Re-encryption
Matthew Green;Giuseppe Ateniese.
applied cryptography and network security (2007)
Outsourcing the decryption of ABE ciphertexts
Matthew Green;Susan Hohenberger;Brent Waters.
usenix security symposium (2011)
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian;Karthikeyan Bhargavan;Zakir Durumeric;Pierrick Gaudry.
computer and communications security (2015)
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian;Karthikeyan Bhargavan;Zakir Durumeric;Pierrick Gaudry.
computer and communications security (2015)
Charm: a framework for rapidly prototyping cryptosystems
Joseph A. Akinyele;Christina Garman;Ian Miers;Matthew W. Pagano.
Journal of Cryptographic Engineering (2013)
Security analysis of a cryptographically-enabled RFID device
Stephen C. Bono;Matthew Green;Adam Stubblefield;Ari Juels.
usenix security symposium (2005)
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
network and distributed system security symposium (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Johns Hopkins University
Johns Hopkins University
George Mason University
University of Michigan–Ann Arbor
The University of Texas at Austin
University of Maryland, College Park
French Institute for Research in Computer Science and Automation - INRIA
University of Bonn
Tel Aviv University
The University of Texas Southwestern Medical Center
Microsoft (United States)
Beijing University of Posts and Telecommunications
University of Southampton
Lomonosov Moscow State University
University of Perugia
Eindhoven University of Technology
Institució Catalana de Recerca i Estudis Avançats
Jilin University
Washington State University
University of Florida
Keio University
University of Oxford
University of Bern
University of Glasgow
University of Edinburgh
University of Western Ontario