CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
Hi-index | 0.00 |
We present a protocol for access control in which any entity can prove its access privileges only to designated servers. This generalizes the problem of abuse freedom to the question of access control. If an abuse free access control device is captured by a malicious party, the information about places or resources it can access would not be revealed to the capturing party.