@misc{cryptoeprint:2015:112, author = {Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, title = {Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/112}, year = {2015}, url = {https://eprint.iacr.org/2015/112}, }