Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys

Ping Wei, Xu an Wang, Xiaoyuan Yang. Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys. In Zhengbing Hu, Ping Ma, editors, Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings. pages 1-4, IEEE, 2010. [doi]

@inproceedings{WeiWY10-0,
  title = {Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys},
  author = {Ping Wei and Xu an Wang and Xiaoyuan Yang},
  year = {2010},
  doi = {10.1109/DBTA.2010.5658954},
  url = {http://dx.doi.org/10.1109/DBTA.2010.5658954},
  researchr = {https://researchr.org/publication/WeiWY10-0},
  cites = {0},
  citedby = {0},
  pages = {1-4},
  booktitle = {Second International Workshop on Database Technology and Applications, DBTA 2010, Wuhan, Hubei, China, November 27-28, 2010, Proceedings},
  editor = {Zhengbing Hu and Ping Ma},
  publisher = {IEEE},
  isbn = {978-1-4244-6977-2},
}