Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys

Ping Wei, Xu an Wang, Xiaoyuan Yang. Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys. In Zhengbing Hu, Ping Ma, editors, Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings. pages 1-4, IEEE, 2010. [doi]

Authors

Ping Wei

This author has not been identified. Look up 'Ping Wei' in Google

Xu an Wang

This author has not been identified. Look up 'Xu an Wang' in Google

Xiaoyuan Yang

This author has not been identified. Look up 'Xiaoyuan Yang' in Google