Proxy Re-encryption Scheme from IBE to CBE

Xu an Wang, Xiaoyuan Yang, Minqing Zhang. Proxy Re-encryption Scheme from IBE to CBE. In First International Workshop on Database Technology and Applications, DBTA 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings. pages 99-102, IEEE Computer Society, 2009. [doi]

@inproceedings{WangYZ09-1,
  title = {Proxy Re-encryption Scheme from IBE to CBE},
  author = {Xu an Wang and Xiaoyuan Yang and Minqing Zhang},
  year = {2009},
  doi = {10.1109/DBTA.2009.47},
  url = {http://doi.ieeecomputersociety.org/10.1109/DBTA.2009.47},
  researchr = {https://researchr.org/publication/WangYZ09-1},
  cites = {0},
  citedby = {0},
  pages = {99-102},
  booktitle = {First International Workshop on Database Technology and Applications, DBTA 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings},
  publisher = {IEEE Computer Society},
  isbn = {978-0-7695-3604-0},
}