Content deleted Content added
added more references |
m Date maintenance tags and general fixes |
||
Line 1:
{{Expert|date=February 2009}}
'''Proxy re-encryption''' schemes are [[cryptosystems]] which allow third-parties ([[proxy server|proxies]]) to alter a [[ciphertext]] which has been [[encryption|encrypted]] for one party, so that it may be decrypted by another.
Line 29:
*S. Hohenberger, G. Rothblum, a. shelat, and V. Vaikuntanathan. Securely Obfuscating Re-encryption. Proceedings of the Theory of Cryptography Conference (TCC), 2007.
*[http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]▼
▲*[http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]
[[Category:Cryptography]]
|