Detecting and Tracing Malicious Activities
This session addresses two aspects of ensuring correct security behavior of network entities.
Topic 1: Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Author: Essam Ghadafi
Topic 2: Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura