"Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys."

Ping Wei, Xu An Wang, Xiaoyuan Yang (2010)

Details and statistics

DOI: 10.1109/DBTA.2010.5658954

access: closed

type: Conference or Workshop Paper

metadata version: 2023-04-03

a service of  Schloss Dagstuhl - Leibniz Center for Informatics