Return to Article Details Proxy Re-encryption Scheme for Decentralizes Erasure Code for Defending the Distributed System Download Download PDF