Cryptology ePrint Archive: Report 2015/112

Available versions in chronological order


Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura
Original publication (with major differences): CT-RSA 2015


[ Cryptology ePrint archive ]