Sciweavers

ISW   2007 International Information Security Workshop (later ISC)
Wall of Fame | Most Viewed ISW-2007 Paper
ISW
2007
Springer
13 years 10 months ago
Identity-Based Proxy Re-encryption Without Random Oracles
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert ...
Cheng-Kang Chu, Wen-Guey Tzeng
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source190
2Download preprint from source159
3Download preprint from source129
4Download preprint from source129
5Download preprint from source124
6Download preprint from source118
7Download preprint from source109
8Download preprint from source108
9Download preprint from source106
10Download preprint from source104
11Download preprint from source102
12Download preprint from source96
13Download preprint from source96
14Download preprint from source80