Cryptology ePrint Archive: Report 2008/509

Available versions in chronological order


Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.

Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.

Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: A previous version of this paper was appeared in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), pp. 1-17, LNCS 5339, Springer-Verlag, 2008.

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
Publication Info: This is a full and improved version which appears in CANS 2008, M.K. Franklin, L.C.K. Hui, and D.S. Wong (Eds.), volume 5339 of LNCS, Springer-Verlag, 2008.


[ Cryptology ePrint archive ]