Cryptology ePrint Archive: Report 2010/192

Available versions in chronological order


Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu

Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu

Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu

Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu

Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu

Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu

Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu


[ Cryptology ePrint archive ]