The following publications are possibly variants of this publication:
- Identity Based Proxy Re-encryption Scheme under LWEWei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang 0001, Ping Zheng. itiis, 11(12):6116-6132, 2017. [doi]
- Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEXiaojian Liang, Jian Weng 0001, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu. esorics 2021: 147-168 [doi]
- Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWEXiaojian Liang, Jian Weng 0001, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu. iacr, 2021:613, 2021. [doi]
- A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud ComputingJuyan Li, Zhiqi Qiao, Kejia Zhang, Chen Cui. sensors, 21(1):288, 2021. [doi]
- Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWEYunxiao Zhou, Shengli Liu 0001, Shuai Han 0001, Haibin Zhang. asiacrypt 2023: 199-231 [doi]
- Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWEYunxiao Zhou, Shengli Liu 0001, Shuai Han, Haibin Zhang. iacr, 2023:1324, 2023. [doi]