Keita Emura, Atsuko Miyaji, Kazumasa Omote. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. In Jan Camenisch, Costas Lambrinoudakis, editors, Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers. Volume 6711 of Lecture Notes in Computer Science, pages 77-92, Springer, 2010. [doi]
@inproceedings{EmuraMO10-0, title = {An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System}, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote}, year = {2010}, doi = {10.1007/978-3-642-22633-5_6}, url = {http://dx.doi.org/10.1007/978-3-642-22633-5_6}, tags = {rule-based, source-to-source, peer-to-peer, open-source}, researchr = {https://researchr.org/publication/EmuraMO10-0}, cites = {0}, citedby = {0}, pages = {77-92}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, editor = {Jan Camenisch and Costas Lambrinoudakis}, volume = {6711}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-22632-8}, }