Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Figure 2

Process flow of the original scheme.