Achieving key privacy without losing CCA security in proxy re-encryption

Jun Shao, Peng Liu 0005, Yuan Zhou. Achieving key privacy without losing CCA security in proxy re-encryption. Journal of Systems and Software, 85(3):655-665, 2012. [doi]

No reviews for this publication, yet.