1. 首页
  2. 数据库
  3. 其它
  4. Achieving key privacy without losing CCA security in proxy re encryption

Achieving key privacy without losing CCA security in proxy re encryption

上传者: 2021-02-27 06:34:20上传 PDF文件 562.93KB 热度 5次
In proxy re-encryption (PRE), a semi-trusted proxy can transform a ciphertext under the delegator’s public key into another ciphertext that the delegatee can decrypt by his/her own private key. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encry
用户评论