The following publications are possibly variants of this publication:
- Hierarchical Identity-Based Proxy Re-Encryption without Random OraclesYanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang. ijfcs, 21(6):1049-1063, 2010. [doi]
- Fully Secure Proxy Re-Encryption without Random OraclesJun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang. iacr, 2007:254, 2007. [doi]
- A Key-Policy Attribute-Based Proxy Re-Encryption Without Random OraclesChunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. cj, 59(7):970-982, 2016. [doi]
- Proxy Re-Signature Schemes without Random OraclesJun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang. iacr, 2007:396, 2007. [doi]
- Proxy Re-signature Schemes Without Random OraclesJun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang. indocrypt 2007: 197-209 [doi]