p.261
p.268
p.274
p.279
p.284
p.289
p.294
p.300
p.305
Analysis of One Proxy Re-Encryption Scheme
Abstract:
Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.
Info:
Periodical:
Pages:
284-288
Citation:
Online since:
October 2011
Authors:
Price:
Сopyright:
© 2012 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: