Proxy re-encryption: Difference between revisions

Content deleted Content added
added more references
SmackBot (talk | contribs)
m Date maintenance tags and general fixes
Line 1:
{{Expert|date=February 2009}}
 
'''Proxy re-encryption''' schemes are [[cryptosystems]] which allow third-parties ([[proxy server|proxies]]) to alter a [[ciphertext]] which has been [[encryption|encrypted]] for one party, so that it may be decrypted by another.
Line 29:
 
*S. Hohenberger, G. Rothblum, a. shelat, and V. Vaikuntanathan. Securely Obfuscating Re-encryption. Proceedings of the Theory of Cryptography Conference (TCC), 2007.
*[http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]
 
 
*[http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]
[[Category:Cryptography]]