Achieving key privacy without losing CCA security in proxy re-encryption

Jun Shao, Peng Liu 0005, Yuan Zhou. Achieving key privacy without losing CCA security in proxy re-encryption. Journal of Systems and Software, 85(3):655-665, 2012. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.