Susan Hohenberger mainly investigates Encryption, Computer security, Ciphertext, Cryptography and Attribute-based encryption. The various areas that she examines in her Encryption study include Theoretical computer science, Distributed computing and Commitment scheme. Her Key, Credential and Anonymity study in the realm of Computer security connects with subjects such as Cheating and TRACE.
Her studies in Ciphertext integrate themes in fields like Obfuscation, Semantic security and Public-key cryptography. Her studies link Random oracle with Cryptography. Her Proxy re-encryption research is multidisciplinary, incorporating elements of Plaintext, Distributed data store and Access control.
Susan Hohenberger mainly focuses on Theoretical computer science, Computer security, Encryption, Cryptography and Random oracle. Her Theoretical computer science research also works with subjects such as
Her work on Ciphertext, Attribute-based encryption and Homomorphic encryption as part of her general Encryption study is frequently connected to Proxy, thereby bridging the divide between different branches of science. She has included themes like Plaintext and Semantic security in her Ciphertext study. Her Random oracle research includes themes of Algorithm, Hash function, Security parameter and Blind signature.
Susan Hohenberger focuses on Theoretical computer science, Encryption, Cryptography, Public-key cryptography and Discrete mathematics. Her Theoretical computer science research incorporates elements of SWIFFT, Random oracle, Hash chain, Obfuscation and Algorithm. Her Random oracle study introduces a deeper knowledge of Computer security.
Within one scientific family, she focuses on topics pertaining to Correctness under Cryptography, and may sometimes address concerns connected to Oblivious transfer and Provable security. Her Public-key cryptography course of study focuses on Signature and Overhead and Authentication. Her Discrete mathematics study integrates concerns from other disciplines, such as Key Holder and Function.
Her main research concerns Random oracle, Theoretical computer science, Public-key cryptography, Algorithm and Pseudorandom number generator. Her research in Random oracle intersects with topics in Signature and Protocol. Her Theoretical computer science study combines topics from a wide range of disciplines, such as SWIFFT, Hash chain, Hash function and Pseudorandom function family.
Her studies deal with areas such as Secure multi-party computation, Cryptography, World Wide Web and Digital signature as well as Public-key cryptography. Her study looks at the relationship between Discrete mathematics and topics such as Variety, which overlap with Encryption. The subject of her Encryption research is within the realm of Computer security.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Improved proxy re-encryption schemes with applications to secure distributed storage
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
ACM Transactions on Information and System Security (2006)
Outsourcing the decryption of ABE ciphertexts
Matthew Green;Susan Hohenberger;Brent Waters.
usenix security symposium (2011)
Chosen-Ciphertext Secure Proxy Re-Encryption.
Ran Canetti;Susan Hohenberger.
IACR Cryptology ePrint Archive (2007)
Compact E-Cash.
Jan Camenisch;Susan Hohenberger;Anna Lysyanskaya.
IACR Cryptology ePrint Archive (2005)
How to securely outsource cryptographic computations
Susan Hohenberger;Anna Lysyanskaya.
theory of cryptography conference (2005)
How to win the clonewars: efficient periodic n-times anonymous authentication
Jan Camenisch;Susan Hohenberger;Markulf Kohlweiss;Anna Lysyanskaya.
computer and communications security (2006)
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger;Brent R Waters.
public key cryptography (2013)
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Giuseppe Ateniese;Kevin Fu;Matthew Green;Susan Hohenberger.
network and distributed system security symposium (2005)
Online/Offline Attribute-Based Encryption
Susan Hohenberger;Brent Waters.
public key cryptography (2014)
Practical Short Signature Batch Verification
Anna Lisa Ferrara;Matthew Green;Susan Hohenberger;Michael Østergaard Pedersen.
the cryptographers track at the rsa conference (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
The University of Texas at Austin
Johns Hopkins University
DFINITY
Brown University
Northeastern University
George Mason University
MIT
University of Michigan–Ann Arbor
University of Edinburgh
Cornell University
Imperial College London
University of California, Berkeley
Tsinghua University
University of Nottingham
Université de Caen Normandie
Spanish National Research Council
Aix-Marseille University
National Institute of Genetics
Charles University
Boston University
National Institutes of Health
University of Calgary
University of Bonn
Baylor College of Medicine
Princess Margaret Cancer Centre
National University of La Plata