Identity-Based Proxy Re-encryption Without Random Oracles

Abstract

In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may… (More)
DOI: 10.1007/978-3-540-75496-1_13

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Statistics

0102020082009201020112012201320142015201620172018
Citations per Year

174 Citations

Semantic Scholar estimates that this publication has 174 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics