Cryptology ePrint Archive: Report 2008/509
Available versions in chronological order
20081202:214445 (posted 02-Dec-2008 21:44:45 UTC)
Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.
20081204:080310 (posted 04-Dec-2008 08:03:10 UTC)
Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.
20090313:153416 (posted 13-Mar-2009 15:34:16 UTC)
Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.
20090504:065348 (posted 04-May-2009 06:53:48 UTC)
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: This is a full and improved version which appears in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), volume 5339 of LNCS, Springer-Verlag, 2008.
[
Cryptology ePrint archive
]