Proxy Re-encryption Scheme Based on SK Identity Based Encryption

Xu an Wang, Xiaoyuan Yang. Proxy Re-encryption Scheme Based on SK Identity Based Encryption. In Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi An, China, 18-20 August 2009. pages 657-660, IEEE Computer Society, 2009. [doi]

@inproceedings{WangY09-7,
  title = {Proxy Re-encryption Scheme Based on SK Identity Based Encryption},
  author = {Xu an Wang and Xiaoyuan Yang},
  year = {2009},
  doi = {10.1109/IAS.2009.191},
  url = {http://dx.doi.org/10.1109/IAS.2009.191},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/WangY09-7},
  cites = {0},
  citedby = {0},
  pages = {657-660},
  booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi An, China, 18-20 August 2009},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3744-3},
}