搜索结果: 1-3 共查到“军队指挥学 Identity-Based Proxy Re-Encryption”相关记录3条 . 查询时间(0.084 秒)
A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Identity-Based Proxy Re-Encryption Collusion-resistance Random Oracle
2018/11/29
Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy ...
New Construction of Identity-based Proxy Re-encryption
Proxy Re-encryption Identity-Based Encryption Transformation
2010/8/24
A proxy re-encryption (PRE) scheme involves three parties: Alice, Bob, and a proxy. PRE allows the proxy to translate a ciphertext encrypted under Alice's public key into one that can be decrypted by ...
Identity-Based Proxy Re-Encryption
proxy re-encryption identity-based encryption bilinear maps
2009/1/8
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext
for Bob without seeing the underlying plaintext. A number of solutions have been proposed in t...