Cryptology ePrint Archive: Report 2011/096
Available versions in chronological order
20110228:223936 (posted 28-Feb-2011 22:39:36 UTC)
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
20110608:191509 (posted 08-Jun-2011 19:15:09 UTC)
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
20110608:192852 (posted 08-Jun-2011 19:28:52 UTC)
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
20110614:225047 (posted 14-Jun-2011 22:50:47 UTC)
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
20111226:193805 (posted 26-Dec-2011 19:38:05 UTC)
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
Publication Info: Full version of paper in TCC 2012.
[
Cryptology ePrint archive
]