Research Article

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing

Table 1

Plaintext, ciphertext, random, encryption time, and reencryption key list information.

DataRandomCiphertextTimeREK list