Cryptology ePrint Archive: Report 2008/387

Available versions in chronological order


On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang

On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang

On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang

On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang and Xiaoyuan Yang

Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang

Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang

Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang

Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang

None
None


[ Cryptology ePrint archive ]