Cryptology ePrint Archive: Report 2013/456

Available versions in chronological order


On the Security of Group-based Proxy Re-encryption Scheme
Purushothama B R and B B Amberker


[ Cryptology ePrint archive ]