The following publications are possibly variants of this publication:
- Proxy Re-encryption Scheme Based on SK Identity Based EncryptionXu an Wang, Xiaoyuan Yang. IEEEias 2009: 657-660 [doi]
- IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiabilityLiqiang Wu, Xiaoyuan Yang 0002, Minqing Zhang, Xu an Wang. jaihc, 13(1):469-482, 2022. [doi]
- Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption SchemeJindan Zhang, Xu an Wang. incos 2012: 581-586 [doi]
- Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus schemeXu an Wang, Fatos Xhafa, Jianfeng Ma, Zhiheng Zheng. jpdc, 130:153-165, 2019. [doi]
- New Identity Based Encryption And Its Proxy Re-encryptionXu an Wang, Xiaoyuan Yang 0002. iacr, 2012:250, 2012. [doi]
- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user NetworksXu an Wang, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei. tcci, 19:69-88, 2015. [doi]
- Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data SharingXu an Wang, Fatos Xhafa, Zhiheng Zheng, Jinting Nie. incos 2016: 44-48 [doi]
- Identity Based Proxy Re-encryption From BB1 IBEJindan Zhang, Xu an Wang, Xiaoyuan Yang 0002. jcp, 8(6):1618-1626, 2013. [doi]
- On the Role of PKG for Proxy Re-encryption in Identity Based SettingXu an Wang, Xiaoyuan Yang 0002, Fagen Li. iacr, 2008:410, 2008. [doi]