Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.

CT-RSA(2015)

引用 36|浏览61
暂无评分
关键词
Proxy Re-encryption, Re-encryption verifiability, Soundness
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要