Cryptology ePrint Archive: Report 2015/112
Available versions in chronological order
20150224:023032 (posted 24-Feb-2015 02:30:32 UTC)
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
Original publication (with major differences): CT-RSA 2015
[
Cryptology ePrint archive
]