The following publications are possibly variants of this publication:
- ID-Based Proxy Re-Encryption Schemes Without Random OracleXiaoming Hu, Zhe Zhang, Taozhi Si. ifip8-3 2009: 428-431 [doi]
- Identity Based Proxy Re-Signature Schemes without Random OracleXiaoming Hu, Zhe Zhang, Yinchun Yang. ifip8-3 2009: 256-259 [doi]
- A Key-Policy Attribute-Based Proxy Re-Encryption Without Random OraclesChunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. cj, 59(7):970-982, 2016. [doi]
- New CCA-Secure Proxy Re-encryption Scheme without Random OraclesXu an Wang, Ping Wei, Minqing Zhang. ifip8-3 2010: 377-381 [doi]