ABSTRACT

Networks, and the fields of the digital right management protection, radio-frequency

identification, proof of taken path, conditional access, biometric authentication, and so

on.

As we see, more and more researchers are working on proxy re-cryptography, es-

pecially on its applications [245]. It is safe to say that applications drive forward the

research on proxy re-cryptography.