Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks

In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-gr...

Full description

Saved in:
Bibliographic Details
Main Authors: Weng, Jian, DENG, Robert H., DING, Xuhua, CHU, Cheng-Kang, LAI, Junzuo
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/453
http://dx.doi.org/10.1145/1533057.1533100
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English