ID-Based Proxy Re-Encryption Schemes Without Random Oracle

Xiaoming Hu, Zhe Zhang, Taozhi Si. ID-Based Proxy Re-Encryption Schemes Without Random Oracle. In 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers. pages 428-431, IEEE Computer Society, 2009. [doi]

@inproceedings{HuZS09,
  title = {ID-Based Proxy Re-Encryption Schemes Without Random Oracle},
  author = {Xiaoming Hu and Zhe Zhang and Taozhi Si},
  year = {2009},
  doi = {10.1109/CIS.2009.123},
  url = {http://doi.ieeecomputersociety.org/10.1109/CIS.2009.123},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/HuZS09},
  cites = {0},
  citedby = {0},
  pages = {428-431},
  booktitle = {2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3931-7},
}