Group-based proxy re-encryption scheme

3Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, proxy re-encryption scheme received much attention. A proxy re-encryption used for divert ciphertext from one group to another without revealing underlying plaintext is proposed in this paper. The scheme is bidirectional and any member can independently decrypt the ciphertext encrypted to its group. The security of the proposed scheme is discussed and proofs are given to show that the scheme withstands chosen ciphertext attack in standard model. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Ma, C., & Ao, J. (2009). Group-based proxy re-encryption scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5754 LNCS, pp. 1025–1034). https://doi.org/10.1007/978-3-642-04070-2_108

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free