Return to Article Details PROXY RE-ENCRYPTION BASED ON THE GENERALIZED EL GAMAL ENCRYPTION SCHEME Download Download PDF