Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.Satsuya Ohata,Yutaka Kawai,Takahiro Matsuda,Goichiro Hanaoka,Kanta MatsuuraCT-RSA(2015)引用 36|浏览61暂无评分关键词Proxy Re-encryption, Re-encryption verifiability, SoundnessAI 理解论文溯源树样例生成溯源树,研究论文发展脉络Chat Paper正在生成论文摘要