D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 9,188 81 World Ranking 6304 National Ranking 3042

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Encryption
  • Algebra

Susan Hohenberger mainly investigates Encryption, Computer security, Ciphertext, Cryptography and Attribute-based encryption. The various areas that she examines in her Encryption study include Theoretical computer science, Distributed computing and Commitment scheme. Her Key, Credential and Anonymity study in the realm of Computer security connects with subjects such as Cheating and TRACE.

Her studies in Ciphertext integrate themes in fields like Obfuscation, Semantic security and Public-key cryptography. Her studies link Random oracle with Cryptography. Her Proxy re-encryption research is multidisciplinary, incorporating elements of Plaintext, Distributed data store and Access control.

Her most cited work include:

  • Improved proxy re-encryption schemes with applications to secure distributed storage (1087 citations)
  • Outsourcing the decryption of ABE ciphertexts (449 citations)
  • Chosen-ciphertext secure proxy re-encryption (439 citations)

What are the main themes of her work throughout her whole career to date?

Susan Hohenberger mainly focuses on Theoretical computer science, Computer security, Encryption, Cryptography and Random oracle. Her Theoretical computer science research also works with subjects such as

  • Standard model that intertwine with fields like Pseudorandom number generator,
  • Signature together with Public-key cryptography,
  • Oblivious transfer that intertwine with fields like Commitment scheme. Her work in the fields of Access control, Credential and Anonymity overlaps with other areas such as Email authentication.

Her work on Ciphertext, Attribute-based encryption and Homomorphic encryption as part of her general Encryption study is frequently connected to Proxy, thereby bridging the divide between different branches of science. She has included themes like Plaintext and Semantic security in her Ciphertext study. Her Random oracle research includes themes of Algorithm, Hash function, Security parameter and Blind signature.

She most often published in these fields:

  • Theoretical computer science (38.24%)
  • Computer security (37.25%)
  • Encryption (36.27%)

What were the highlights of her more recent work (between 2013-2020)?

  • Theoretical computer science (38.24%)
  • Encryption (36.27%)
  • Cryptography (22.55%)

In recent papers she was focusing on the following fields of study:

Susan Hohenberger focuses on Theoretical computer science, Encryption, Cryptography, Public-key cryptography and Discrete mathematics. Her Theoretical computer science research incorporates elements of SWIFFT, Random oracle, Hash chain, Obfuscation and Algorithm. Her Random oracle study introduces a deeper knowledge of Computer security.

Within one scientific family, she focuses on topics pertaining to Correctness under Cryptography, and may sometimes address concerns connected to Oblivious transfer and Provable security. Her Public-key cryptography course of study focuses on Signature and Overhead and Authentication. Her Discrete mathematics study integrates concerns from other disciplines, such as Key Holder and Function.

Between 2013 and 2020, her most popular works were:

  • Online/Offline Attribute-Based Encryption (134 citations)
  • Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation (113 citations)
  • Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model (32 citations)

In her most recent research, the most cited papers focused on:

  • Cryptography
  • Public-key cryptography
  • Algebra

Her main research concerns Random oracle, Theoretical computer science, Public-key cryptography, Algorithm and Pseudorandom number generator. Her research in Random oracle intersects with topics in Signature and Protocol. Her Theoretical computer science study combines topics from a wide range of disciplines, such as SWIFFT, Hash chain, Hash function and Pseudorandom function family.

Her studies deal with areas such as Secure multi-party computation, Cryptography, World Wide Web and Digital signature as well as Public-key cryptography. Her study looks at the relationship between Discrete mathematics and topics such as Variety, which overlap with Encryption. The subject of her Encryption research is within the realm of Computer security.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Improved proxy re-encryption schemes with applications to secure distributed storage

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)

1545 Citations

Outsourcing the decryption of ABE ciphertexts

Matthew Green;Susan Hohenberger;Brent Waters.
usenix security symposium (2011)

831 Citations

Chosen-Ciphertext Secure Proxy Re-Encryption.

Ran Canetti;Susan Hohenberger.
IACR Cryptology ePrint Archive (2007)

645 Citations

Compact E-Cash.

Jan Camenisch;Susan Hohenberger;Anna Lysyanskaya.
IACR Cryptology ePrint Archive (2005)

542 Citations

How to securely outsource cryptographic computations

Susan Hohenberger;Anna Lysyanskaya.
theory of cryptography conference (2005)

452 Citations

How to win the clonewars: efficient periodic n-times anonymous authentication

Jan Camenisch;Susan Hohenberger;Markulf Kohlweiss;Anna Lysyanskaya.
computer and communications security (2006)

307 Citations

Attribute-Based Encryption with Fast Decryption

Susan Hohenberger;Brent R Waters.
public key cryptography (2013)

299 Citations

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.

Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
network and distributed system security symposium (2005)

280 Citations

Online/Offline Attribute-Based Encryption

Susan Hohenberger;Brent Waters.
public key cryptography (2014)

275 Citations

Practical Short Signature Batch Verification

Anna Lisa Ferrara;Matthew Green;Susan Hohenberger;Michael Østergaard Pedersen.
the cryptographers track at the rsa conference (2009)

273 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Susan Hohenberger

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 93

Yi Mu

Yi Mu

Fujian Normal University

Publications: 60

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 46

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 46

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 41

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 41

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 37

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 37

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 37

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 35

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 33

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 32

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 31

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 30

Dennis Hofheinz

Dennis Hofheinz

ETH Zurich

Publications: 30

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 28

Trending Scientists

David J. Hand

David J. Hand

Imperial College London

Kenneth Train

Kenneth Train

University of California, Berkeley

Chunxiao Jiang

Chunxiao Jiang

Tsinghua University

Marcus Kaiser

Marcus Kaiser

University of Nottingham

Marco Daturi

Marco Daturi

Université de Caen Normandie

L. Vázquez

L. Vázquez

Spanish National Research Council

Laurent Villard

Laurent Villard

Aix-Marseille University

Ryu Ueda

Ryu Ueda

National Institute of Genetics

Marek Stibal

Marek Stibal

Charles University

David H. Sherr

David H. Sherr

Boston University

Sharon A. Savage

Sharon A. Savage

National Institutes of Health

Patrick W.K. Lee

Patrick W.K. Lee

University of Calgary

Martin Kurthen

Martin Kurthen

University of Bonn

Morey W. Haymond

Morey W. Haymond

Baylor College of Medicine

Andrea Bezjak

Andrea Bezjak

Princess Margaret Cancer Centre

Gastón Folatelli

Gastón Folatelli

National University of La Plata

Something went wrong. Please try again later.