Sign in

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.

Kaitai LiangWilly SusiloJoseph K. LiuDuncan S. Wong
Published in: Comput. J. (2015)
Keyphrases