Key-Private Proxy Re-Encryption from Lattices, Revisited. Nishimaki, R. & Xagawa, K. IEICE Transactions, 98-A(1):100–116, 2015. Paper doi bibtex @article{DBLP:journals/ieicet/NishimakiX15,
author = {Ryo Nishimaki and
Keita Xagawa},
title = {Key-Private Proxy Re-Encryption from Lattices, Revisited},
journal = {{IEICE} Transactions},
volume = {98-A},
number = {1},
pages = {100--116},
year = {2015},
url = {https://doi.org/10.1587/transfun.E98.A.100},
doi = {10.1587/transfun.E98.A.100},
timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"Z9mTjomYiW4tBNcL9","bibbaseid":"nishimaki-xagawa-keyprivateproxyreencryptionfromlatticesrevisited-2015","authorIDs":[],"author_short":["Nishimaki, R.","Xagawa, K."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ryo"],"propositions":[],"lastnames":["Nishimaki"],"suffixes":[]},{"firstnames":["Keita"],"propositions":[],"lastnames":["Xagawa"],"suffixes":[]}],"title":"Key-Private Proxy Re-Encryption from Lattices, Revisited","journal":"IEICE Transactions","volume":"98-A","number":"1","pages":"100–116","year":"2015","url":"https://doi.org/10.1587/transfun.E98.A.100","doi":"10.1587/transfun.E98.A.100","timestamp":"Wed, 25 Sep 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/ieicet/NishimakiX15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ieicet/NishimakiX15,\n author = {Ryo Nishimaki and\n Keita Xagawa},\n title = {Key-Private Proxy Re-Encryption from Lattices, Revisited},\n journal = {{IEICE} Transactions},\n volume = {98-A},\n number = {1},\n pages = {100--116},\n year = {2015},\n url = {https://doi.org/10.1587/transfun.E98.A.100},\n doi = {10.1587/transfun.E98.A.100},\n timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Nishimaki, R.","Xagawa, K."],"key":"DBLP:journals/ieicet/NishimakiX15","id":"DBLP:journals/ieicet/NishimakiX15","bibbaseid":"nishimaki-xagawa-keyprivateproxyreencryptionfromlatticesrevisited-2015","role":"author","urls":{"Paper":"https://doi.org/10.1587/transfun.E98.A.100"},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/pid/17/5868.bib","creationDate":"2020-02-14T02:49:45.834Z","downloads":0,"keywords":[],"search_terms":["key","private","proxy","encryption","lattices","revisited","nishimaki","xagawa"],"title":"Key-Private Proxy Re-Encryption from Lattices, Revisited","year":2015,"dataSources":["E3xnHK39Zch42ZpoA"]}