Return to Article Details Proxy re-encryption Scheme for IIoT using Algebraic Structure Download Download PDF