Achieving key privacy without losing CCA security in proxy re-encryption

Jun Shao, Peng Liu 0005, Yuan Zhou. Achieving key privacy without losing CCA security in proxy re-encryption. Journal of Systems and Software, 85(3):655-665, 2012. [doi]

@article{ShaoLZ12,
  title = {Achieving key privacy without losing CCA security in proxy re-encryption},
  author = {Jun Shao and Peng Liu 0005 and Yuan Zhou},
  year = {2012},
  doi = {10.1016/j.jss.2011.09.034},
  url = {http://dx.doi.org/10.1016/j.jss.2011.09.034},
  researchr = {https://researchr.org/publication/ShaoLZ12},
  cites = {0},
  citedby = {0},
  journal = {Journal of Systems and Software},
  volume = {85},
  number = {3},
  pages = {655-665},
}