Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
Satsuya OhataYutaka KawaiTakahiro MatsudaGoichiro HanaokaKanta MatsuuraPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- proxy re encryption
- ciphertext
- encryption scheme
- detect malicious
- standard model
- identity based encryption
- public key
- secret key
- keyword search
- security model
- security analysis
- security properties
- diffie hellman
- detecting malicious
- digital signature
- private key
- hash functions
- end to end
- data mining
- lossless compression
- data sharing
- structured data
- search engine