ABSTRACT
Networks, and the fields of the digital right management protection, radio-frequency
identification, proof of taken path, conditional access, biometric authentication, and so
on.
As we see, more and more researchers are working on proxy re-cryptography, es-
pecially on its applications [245]. It is safe to say that applications drive forward the
research on proxy re-cryptography.