An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System
2011 ◽
Vol 33
(5)
◽
pp. 1266-1270
Keyword(s):
2010 ◽
Vol 1
(2)
◽
pp. 1-21
Keyword(s):
2016 ◽
Vol 6
(3)
◽
pp. 178
Keyword(s):