Tracing Malicious Proxies in Proxy Re-encryption

Benoît Libert, Damien Vergnaud. Tracing Malicious Proxies in Proxy Re-encryption. In Steven D. Galbraith, Kenneth G. Paterson, editors, Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Volume 5209 of Lecture Notes in Computer Science, pages 332-353, Springer, 2008. [doi]

@inproceedings{LibertV08:1,
  title = {Tracing Malicious Proxies in Proxy Re-encryption},
  author = {Benoît Libert and Damien Vergnaud},
  year = {2008},
  doi = {10.1007/978-3-540-85538-5_22},
  url = {http://dx.doi.org/10.1007/978-3-540-85538-5_22},
  researchr = {https://researchr.org/publication/LibertV08%3A1},
  cites = {0},
  citedby = {0},
  pages = {332-353},
  booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings},
  editor = {Steven D. Galbraith and Kenneth G. Paterson},
  volume = {5209},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-85503-3},
}