Secret Data Access Based on Proxy Re-encryption

碩士 === 國立中央大學 === 資訊工程學系 === 105 === Proxy re-encryption schemes enable users to share their digital content with other parties in a more ecient way. In existing proxy re-encryption schemes, the security issues of key exposure attack and unauthorized re-encryption and the performance challenges have...

Full description

Bibliographic Details
Main Authors: Hsueh-Cheng Chen, 陳學呈
Other Authors: Sung-Ming Yen
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/bdsa7t

Similar Items