Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing

Yanjiang Yang, Liang Gu, Feng Bao. Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. In Liqun Chen, Moti Yung, editors, Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Volume 6802 of Lecture Notes in Computer Science, pages 189-199, Springer, 2010. [doi]

Abstract

Abstract is missing.