Cryptology ePrint Archive: Report 2007/254

Available versions in chronological order


Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang

Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang

Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang


[ Cryptology ePrint archive ]