CryptoDB
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: | |
---|---|
Download: |
BibTeX
@article{eprint-2015-27042, title={Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption}, journal={IACR Cryptology ePrint Archive}, volume={2015}, pages={112}, url={https://eprint.iacr.org/2015/112}, author={Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, year=2015 }