[PDF][PDF] Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.

J Zhang, XA Wang, X Yang - J. Comput., 2013 - jcomputers.us
In proxy re-encryption, a proxy can transform a ciphertext computed under A's public key into
one that can be opened under B's decryption key. In this paper, we focus on the the research …

[引用][C] Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG

J Zhang, XA Wang, X Yang - JOURNAL OF COMPUTERS, 2013