Identity-Based Proxy Re-encryption Without Random Oracles


In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may… (More)
DOI: 10.1007/978-3-540-75496-1_13


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.


Citations per Year

174 Citations

Semantic Scholar estimates that this publication has 174 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics