The following publications are possibly variants of this publication:
- Hybrid Proxy Re-encryption Between IBE And CBEJindan Zhang, Xu an Wang, Xiaoyuan Yang 0002. jcp, 8(7):1873-1881, 2013. [doi]
- How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBEKe Niu, Xu an Wang, Minqing Zhang. dbta 2009: 95-98 [doi]
- Proxy Re-encryption from CLE to CBEPing Wei, Xu an Wang, Xiaoyuan Yang 0002. ifip8-3 2010: 339-342 [doi]
- Identity Based Proxy Re-encryption From BB1 IBEJindan Zhang, Xu an Wang, Xiaoyuan Yang 0002. jcp, 8(6):1618-1626, 2013. [doi]
- A Novel Deterministic Threshold Proxy Re-Encryption Scheme From LatticesNa Hua, Juyan Li, Kejia Zhang, Long Zhang. ijisp, 16(1):1-17, 2022. [doi]