International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption

Authors:
Satsuya Ohata
Yutaka Kawai
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
Download:
URL: https://eprint.iacr.org/2015/112
Search ePrint
Search Google
BibTeX
@article{eprint-2015-27042,
  title={Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption},
  journal={IACR Cryptology ePrint Archive},
  volume={2015},
  pages={112},
  url={https://eprint.iacr.org/2015/112},
  author={Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura},
  year=2015
}