Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
From MaRDI portal
Publication:990087
DOI10.1016/j.ipl.2009.09.010zbMath1209.68225WikidataQ114261295 ScholiaQ114261295MaRDI QIDQ990087
Publication date: 2 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.09.010
68P25: Data encryption (aspects in computer science)