Date: 2018-05-03 11:03:06Cryptography Public-key cryptography Proxy re-encryption ID-based encryption Homomorphic encryption ElGamal encryption Chosen-ciphertext attack Encryption RSA Key Symmetric-key algorithm Identity-based conditional proxy re-encryption | | Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 571,65 KBShare Document on Facebook
|