The following publications are possibly variants of this publication:
- Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentChunguang Ma, Juyan Li, Weiping Ouyang. ijfcs, 28(6):645-660, 2017. [doi]
- Ciphertext-policy attribute-based proxy re-encryption via constrained PRFsZengpeng Li, Vishal Sharma 0001, Chunguang Ma, Chunpeng Ge, Willy Susilo. chinaf, 64(6), 2021. [doi]
- A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart gridCong Wang 0004, Peng Huo, Maode Ma, Tong Zhou, Yiying Zhang. computing, 105(11):2511-2537, November 2023. [doi]
- A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud StorageWei Luo, Wenping Ma. icccsec 2018: 519-530 [doi]
- Key Policy Attribute-based Proxy Re-encryption and RCCA Secure SchemeKeying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma. jisis, 4(2):70-82, 2014. [doi]