Proxy re-encryption: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: title, template type. Add: chapter-url, chapter. Removed or converted URL. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | #UCB_CommandLine
m replaced dead link with archive link
Line 28:
* S. Hohenberger, G. Rothblum, a. shelat, and V. Vaikuntanathan. Securely Obfuscating Re-encryption. Proceedings of the Theory of Cryptography Conference (TCC), 2007.
* [http://spar.isi.jhu.edu/~mgreen/prl/ The JHU-MIT Proxy Re-cryptography Library]
* [https://web.archive.org/web/20150916004239/http://tdtndc.sjtuzjgsu.edu.cn/~jshao/prcbib.htm Bibliography on Proxy Re-Cryptography]
 
[[Category:Public-key cryptography]]