An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System

Keita Emura, Atsuko Miyaji, Kazumasa Omote. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. In Jan Camenisch, Costas Lambrinoudakis, editors, Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers. Volume 6711 of Lecture Notes in Computer Science, pages 77-92, Springer, 2010. [doi]

@inproceedings{EmuraMO10-0,
  title = {An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System},
  author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote},
  year = {2010},
  doi = {10.1007/978-3-642-22633-5_6},
  url = {http://dx.doi.org/10.1007/978-3-642-22633-5_6},
  tags = {rule-based, source-to-source, peer-to-peer, open-source},
  researchr = {https://researchr.org/publication/EmuraMO10-0},
  cites = {0},
  citedby = {0},
  pages = {77-92},
  booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers},
  editor = {Jan Camenisch and Costas Lambrinoudakis},
  volume = {6711},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-22632-8},
}