2011
DOI: 10.4028/www.scientific.net/amm.135-136.284
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of One Proxy Re-Encryption Scheme

Abstract: Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…The 3D printing technology, which can create complicated structures and improve product quality, has greatly promoted the manufacturing industry [1,2,3,4,5]. Fenton et al proposed a topology-based grammatical evolution (GE) algorithm to create practical 3D structures [6].…”
Section: Introductionmentioning
confidence: 99%
“…The 3D printing technology, which can create complicated structures and improve product quality, has greatly promoted the manufacturing industry [1,2,3,4,5]. Fenton et al proposed a topology-based grammatical evolution (GE) algorithm to create practical 3D structures [6].…”
Section: Introductionmentioning
confidence: 99%