Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Figure 3

Process flow with additional improvement algorithms.