Report - Proxy Re-Encryption Scheme Supporting a Selection of ... · traceability of the proxy so that Alice can detect if it has leaked some re-encryption keys. Keywords: proxy re-encryption,

Please pass captcha verification before submit form