Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption

Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura. Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. In Kaisa Nyberg, editor, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Volume 9048 of Lecture Notes in Computer Science, pages 410-428, Springer, 2015. [doi]

Abstract

Abstract is missing.