On the security of two identity-based conditional proxy re-encryption schemes

Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-c...

Full description

Saved in:
Bibliographic Details
Main Authors: HE, Kai, WENG, Jian, DENG, Robert H., LIU, Joseph K.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3881
https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first