| Improved proxy re-encryption schemes with applications to secure distributed storage G Ateniese, K Fu, M Green, S Hohenberger ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006 | 2203 | 2006 |
| Outsourcing the decryption of {ABE} ciphertexts M Green, S Hohenberger, B Waters 20th USENIX security symposium (USENIX Security 11), 2011 | 1098 | 2011 |
| Chosen-ciphertext secure proxy re-encryption R Canetti, S Hohenberger Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 734 | 2007 |
| Compact e-cash J Camenisch, S Hohenberger, A Lysyanskaya Annual International Conference on the Theory and Applications of …, 2005 | 664 | 2005 |
| How to securely outsource cryptographic computations S Hohenberger, A Lysyanskaya Theory of cryptography conference, 264-282, 2005 | 504 | 2005 |
| Online/offline attribute-based encryption S Hohenberger, B Waters International workshop on public key cryptography, 293-310, 2014 | 391 | 2014 |
| How to win the clonewars: efficient periodic n-times anonymous authentication J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ... Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 365 | 2006 |
| Attribute-based encryption with fast decryption S Hohenberger, B Waters International workshop on public key cryptography, 162-179, 2013 | 324 | 2013 |
| Key-private proxy re-encryption G Ateniese, K Benson, S Hohenberger Cryptographers’ Track at the RSA Conference, 279-294, 2009 | 309 | 2009 |
| Practical short signature batch verification AL Ferrara, M Green, S Hohenberger, MØ Pedersen Cryptographers’ Track at the RSA Conference, 309-324, 2009 | 308 | 2009 |
| Proxy re-signatures: new definitions, algorithms, and applications G Ateniese, S Hohenberger Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 263 | 2005 |
| Batch verification of short signatures J Camenisch, S Hohenberger, MØ Pedersen Annual International Conference on the Theory and Applications of …, 2007 | 244 | 2007 |
| Securely obfuscating re-encryption S Hohenberger, GN Rothblum, A Shelat, V Vaikuntanathan Theory of Cryptography Conference, 233-252, 2007 | 241 | 2007 |
| Tetris is hard, even to approximate ED Demaine, S Hohenberger, D Liben-Nowell International Computing and Combinatorics Conference, 351-363, 2003 | 213 | 2003 |
| Blind identity-based encryption and simulatable oblivious transfer M Green, S Hohenberger International Conference on the Theory and Application of Cryptology and …, 2007 | 196 | 2007 |
| Short and stateless signatures from the RSA assumption S Hohenberger, B Waters Annual International Cryptology Conference, 654-670, 2009 | 192 | 2009 |
| Practical group signatures without random oracles G Ateniese, J Camenisch, S Hohenberger, B De Medeiros Cryptology ePrint Archive, 2005 | 184 | 2005 |
| Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures S Hohenberger, A Sahai, B Waters Annual Cryptology Conference, 494-512, 2013 | 153 | 2013 |
| Computing on authenticated data JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters Theory of Cryptography Conference, 1-20, 2012 | 151 | 2012 |
| Balancing accountability and privacy using e-cash J Camenisch, S Hohenberger, A Lysyanskaya International conference on security and cryptography for networks, 141-155, 2006 | 145 | 2006 |