Login / Signup
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
Satsuya Ohata
Yutaka Kawai
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
Published in:
CT-RSA (2015)
Keyphrases
</>
proxy re encryption
ciphertext
detect malicious
encryption scheme
standard model
secret key
security model
public key
identity based encryption
keyword search
security analysis
private key
security properties
diffie hellman
detecting malicious
smart card
secret sharing scheme
access control
data mining
databases