Cryptology ePrint Archive: Report 2008/387
Available versions in chronological order
20080915:153202 (posted 15-Sep-2008 15:32:02 UTC)
On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang
20080916:041105 (posted 16-Sep-2008 04:11:05 UTC)
On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang
20080916:054205 (posted 16-Sep-2008 05:42:05 UTC)
On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang
20081005:232720 (posted 05-Oct-2008 23:27:20 UTC)
On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1
Xu an Wang and Xiaoyuan Yang
20081213:055441 (posted 13-Dec-2008 05:54:41 UTC)
Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang
20090111:043459 (posted 11-Jan-2009 04:34:59 UTC)
Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang
20090111:043630 (posted 11-Jan-2009 04:36:30 UTC)
Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang
20090111:101130 (posted 11-Jan-2009 10:11:30 UTC)
Breaking and Repairing Proxy Re-encryption from IBE to IBE in Pairing'07
Xu an Wang and Xiaoyuan Yang
20090213:121540 (posted 13-Feb-2009 12:15:40 UTC)
None
None
[
Cryptology ePrint archive
]