2/ 3
Decentralized identity : granting privacy with proxy re-encryption (
)
21 Nov, 2019
"As common encryption techniques reach their limits when applied to complex decentralized identity schemes, proxy re-encryption may emerge as a suitable solution."