Cryptology ePrint Archive: Report 2010/192
Available versions in chronological order
20100409:151030 (posted 09-Apr-2010 15:10:30 UTC)
Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu
20100413:041340 (posted 13-Apr-2010 04:13:40 UTC)
Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu
20100611:090130 (posted 11-Jun-2010 09:01:30 UTC)
Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu
20100611:091218 (posted 11-Jun-2010 09:12:18 UTC)
Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu
20100621:143503 (posted 21-Jun-2010 14:35:03 UTC)
Non-Transferable Proxy Re-Encryption
Yi-Jun He, L.C.K. Hui, and S.M. Yiu
20110214:071952 (posted 14-Feb-2011 07:19:52 UTC)
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
20110331:110725 (posted 31-Mar-2011 11:07:25 UTC)
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
[
Cryptology ePrint archive
]