Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings

Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed fil...

Full description

Saved in:
Bibliographic Details
Main Authors: Weng, Jian, DENG, Huijie, Robert, Liu, Shengli, Chen, Kefei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1303
https://ink.library.smu.edu.sg/context/sis_research/article/2302/viewcontent/Deng2010yanjiang_proxy_encryption.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English

Similar Items