{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:25Z","timestamp":1750219765016,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Heilongjiang Provincial Natural Science Foundation of China","award":["YQ2020F013"],"award-info":[{"award-number":["YQ2020F013"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802118"],"award-info":[{"award-number":["61802118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province","award":["UNPYSCT-2018015"],"award-info":[{"award-number":["UNPYSCT-2018015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3565387.3565411","type":"proceedings-article","created":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T01:47:11Z","timestamp":1670982431000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9114-9350","authenticated-orcid":false,"given":"Na","family":"Hua","sequence":"first","affiliation":[{"name":"School of Mathematical Sciences, Heilongjiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4488-2020","authenticated-orcid":false,"given":"Long","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Heilongjiang University, China and \rInstitute for Cryptology &amp; Network Security, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-6076","authenticated-orcid":false,"given":"Kejia","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Heilongjiang University, China and \rInstitute for Cryptology &amp; Network Security, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Chinese Journal of Network and Information Security, (April 2016)","author":"Kaimin Wei","year":"2016","unstructured":"Kaimin Wei , Jian Weng, Kui Ren . 2016 . Data security and protection techniques in big data: a survey . Chinese Journal of Network and Information Security, (April 2016) 2(4), 1 - 11 . DOI: 10.11959\/j.issn.2096-109x.2016.00046 10.11959\/j.issn.2096-109x.2016.00046 Kaimin Wei, Jian Weng, Kui Ren. 2016. Data security and protection techniques in big data: a survey. Chinese Journal of Network and Information Security, (April 2016) 2(4), 1-11. DOI: 10.11959\/j.issn.2096-109x.2016.00046"},{"key":"e_1_3_2_1_2_1","article-title":"Preserving Privacy in Big Data: A Survey from the Cryptographic Perspective","author":"Liusheng Huang","year":"2015","unstructured":"Liusheng Huang , Miaomiao Tian, He Huang . 2015 . Preserving Privacy in Big Data: A Survey from the Cryptographic Perspective . Journal of Software , (Feb 2015) 26(4): 945\u2212959. DOI: 10.13328\/j.cnki.jos.004794 10.13328\/j.cnki.jos.004794 Liusheng Huang, Miaomiao Tian, He Huang. 2015. Preserving Privacy in Big Data: A Survey from the Cryptographic Perspective. Journal of Software, (Feb 2015) 26(4): 945\u2212959. DOI: 10.13328\/j.cnki.jos.004794","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_3_1","first-page":"00","volume-title":"Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques","author":"Matt Blaze","year":"1998","unstructured":"Matt Blaze , Gerrit Bleumer, Martin Strauss . 1998 . Divertible protocols and atomic proxy cryptography . Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques , Espoo, Finland, May 31 - June 4, 1998, Proceeding. Springer, Berlin, Heidelberg. https:\/\/link.springer.com\/chapter\/10.1007\/BFb 00 - 54122 Matt Blaze, Gerrit Bleumer, Martin Strauss. 1998. Divertible protocols and atomic proxy cryptography. Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding. Springer, Berlin, Heidelberg. https:\/\/link.springer.com\/chapter\/10.1007\/BFb00-54122"},{"volume-title":"Identity-based proxy re-encryption","author":"Matthew Green","key":"e_1_3_2_1_4_1","unstructured":"Matthew Green , Giuseppe Ateniese. 2006. Identity-based proxy re-encryption . Springer , Berlin, Heidelberg . DOI: 10.1007\/978-3-540-72738-5_19 10.1007\/978-3-540-72738-5_19 Matthew Green, Giuseppe Ateniese. 2006. Identity-based proxy re-encryption. Springer, Berlin, Heidelberg. DOI: 10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_1_5_1","volume-title":"ACM Conference on Computer & Communications Security. ACM. https:\/\/dl.acm.org\/doi\/10","author":"Ran Canetti","year":"2007","unstructured":"Ran Canetti , Susan Hohenberger. 2007 . Chosen-ciphertext secure proxy re-encryption . ACM Conference on Computer & Communications Security. ACM. https:\/\/dl.acm.org\/doi\/10 .1145\/1315245.1315269 Ran Canetti, Susan Hohenberger. 2007. Chosen-ciphertext secure proxy re-encryption. ACM Conference on Computer & Communications Security. ACM. https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315269"},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Public Key Cryptography. Springer","author":"Jun SHAO","year":"2009","unstructured":"Jun SHAO , Zhenfu CAO . 2009 . CCA-Secure Proxy Re-encryption without Pairings . International Workshop on Public Key Cryptography. Springer , Berlin, Heidelberg. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-00468-1_20 Jun SHAO, Zhenfu CAO. 2009. CCA-Secure Proxy Re-encryption without Pairings. International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-00468-1_20"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Jian WENG Minrong CHEN Yanjiang YANG Robert DENG Kefei CHEN Bao FENG. 2010. CCA secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. SCIENCE CHINA Information Sciences. DOI:10.1007\/s11432-010-0047-3 10.1007\/s11432-010-0047-3","DOI":"10.1007\/s11432-010-0047-3"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Jian WENG Minrong CHEN Yanjiang YANG Robert DENG Kefei CHEN Bao FENG. 2010. CCA secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. SCIENCE CHINA Information Sciences. DOI:10.1007\/s11432-010-0047-3","DOI":"10.1007\/s11432-010-0047-3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_9_1","first-page":"469","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Taher El Gamal","year":"1984","unstructured":"Taher El Gamal . 1984 . A public key cryptosystem and a signature scheme based on discrete logarithms . IEEE Trans. Inf. Theory , 31 , 469 - 472 . DOI:10.1109\/TIT.1985.1057074 10.1109\/TIT.1985.1057074 Taher El Gamal. 1984. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory, 31, 469-472. DOI:10.1109\/TIT.1985.1057074","journal-title":"IEEE Trans. Inf. Theory"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. the 35th Annual Symposium on Foundations of Computer Science","author":"Peter W.","year":"1994","unstructured":"Peter W. Shor . 1994 . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer . Proc. the 35th Annual Symposium on Foundations of Computer Science , Santa Fe, NM , Nov. 20-22, 1994. IEEE Computer Society Press. DOI:10.1137\/S00975397952-93172 10.1137\/S00975397952-93172 Peter W. Shor. 1994. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Proc. the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, Nov. 20-22, 1994. IEEE Computer Society Press. DOI:10.1137\/S00975397952-93172"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Mikl\u00f3s Ajtai. 1996. Generating hard instance of lattice problems. https:\/\/www.researchgate.net\/publication\/266920710_Generating_hard_instance_of_lattice_pro-blems  Mikl\u00f3s Ajtai. 1996. Generating hard instance of lattice problems. https:\/\/www.researchgate.net\/publication\/266920710_Generating_hard_instance_of_lattice_pro-blems","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_1_12_1","volume-title":"Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme","author":"Kunwar Singh C.","year":"2060","unstructured":"Kunwar Singh , C. Pandu Rangan , A. K. Banerjee . 2014. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme . Springer International Publishing . https:\/\/link.springer.com\/chapter\/10.10-07\/978-3-319-1 2060 -7_6 Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. 2014. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme. Springer International Publishing. https:\/\/link.springer.com\/chapter\/10.10-07\/978-3-319-12060-7_6"},{"key":"#cr-split#-e_1_3_2_1_13_1.1","doi-asserted-by":"crossref","unstructured":"M. M. Jiang Y. P. Hu B. C. Wang F. H. Wang Q. Q. Lai. 2015. Lattice-based multi-use unidirectional proxy re-encryption. Security and Communication Networks. DOI: 10.1002\/sec.1300 10.1002\/sec.1300","DOI":"10.1002\/sec.1300"},{"key":"#cr-split#-e_1_3_2_1_13_1.2","doi-asserted-by":"crossref","unstructured":"M. M. Jiang Y. P. Hu B. C. Wang F. H. Wang Q. Q. Lai. 2015. Lattice-based multi-use unidirectional proxy re-encryption. Security and Communication Networks. DOI: 10.1002\/sec.1300","DOI":"10.1002\/sec.1300"},{"key":"e_1_3_2_1_14_1","unstructured":"Liqiang WU Xiaoyuan YANG Minqing ZHANG Longfei LIU. 2019. New identity based proxy re-encryption scheme from lattices. China Communications. DOI: 10. 23919\/JCC.2019.10.011  Liqiang WU Xiaoyuan YANG Minqing ZHANG Longfei LIU. 2019. New identity based proxy re-encryption scheme from lattices. China Communications. DOI: 10. 23919\/JCC.2019.10.011"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"6","article-title":"Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model","volume":"41","author":"Mingming JIANG","year":"2019","unstructured":"Mingming JIANG , Yuyan GUO , Lei YU , Wangan SONG , Shimin WEI . 2019 . Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model . Journal of Electronics and Information Technology , 41 ( 1 ), 6 . DOI: 10.11999\/JEIT180146 10.11999\/JEIT180146 Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI. 2019. Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model. Journal of Electronics and Information Technology, 41(1), 6. DOI: 10.11999\/JEIT180146","journal-title":"Journal of Electronics and Information Technology"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability","author":"Liqiang WU","year":"2021","unstructured":"Liqiang WU , Xiaoyuan YANG , Minqing ZHANG , Xu\u2018an WANG . 2021 . IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability . Journal of Ambient Intelligence and Humanized Computing (18) , 1 - 14 . DOI: 10.1007\/s12652-021-02911-9 10.1007\/s12652-021-02911-9 Liqiang WU, Xiaoyuan YANG, Minqing ZHANG, Xu\u2018an WANG. 2021. IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. Journal of Ambient Intelligence and Humanized Computing (18), 1-14. DOI: 10.1007\/s12652-021-02911-9","journal-title":"Journal of Ambient Intelligence and Humanized Computing (18)"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Annual ACM Symposium on Theory of Computing, 56(6). DOI: 10","author":"Oded Regev","year":"2009","unstructured":"Oded Regev . 2009 . On lattices, learning with errors, random linear codes, and cryptography . Proceedings of the Annual ACM Symposium on Theory of Computing, 56(6). DOI: 10 .1145\/1060590.1060603 10.1145\/1060590.1060603 Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. Proceedings of the Annual ACM Symposium on Theory of Computing, 56(6). DOI: 10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc Stoc. DOI: 10","author":"Ajtai M.","year":"1998","unstructured":"Ajtai , M. 1998 . The shortest vector problem in l2 is np -hard for randomized reductions (extended abstract) . Proc Stoc. DOI: 10 .1145\/27-6698.276705 10.1145\/27-6698.276705 Ajtai, M. 1998. The shortest vector problem in l2 is np -hard for randomized reductions (extended abstract). Proc Stoc. DOI: 10.1145\/27-6698.276705"},{"volume-title":"Spring: fast pseudorandom functions from rounded ring products","author":"Abhishek Banerjee","key":"e_1_3_2_1_19_1","unstructured":"Abhishek Banerjee , Chris Peikert, Alon Rosen . 2014. Spring: fast pseudorandom functions from rounded ring products . Springer Berlin Heidelberg . DOI: 10.1007\/978-3-662-46706-0_3 10.1007\/978-3-662-46706-0_3 Abhishek Banerjee, Chris Peikert, Alon Rosen. 2014. Spring: fast pseudorandom functions from rounded ring products. Springer Berlin Heidelberg. DOI: 10.1007\/978-3-662-46706-0_3"},{"key":"e_1_3_2_1_20_1","article-title":"CCA Secure Public Key Encryption Scheme Based on the Learning-with-Rounding Problem","author":"Ran DUAN","year":"2014","unstructured":"Ran DUAN , Chunxiang GU. 2014 . CCA Secure Public Key Encryption Scheme Based on the Learning-with-Rounding Problem . Journal of Information Engineering University , (Dec 2014) 15(6), 7. DOI: 10.3969\/j.issn.1671-0673.2014.06.001 10.3969\/j.issn.1671-0673.2014.06.001 Ran DUAN, Chunxiang GU. 2014. CCA Secure Public Key Encryption Scheme Based on the Learning-with-Rounding Problem. Journal of Information Engineering University, (Dec 2014) 15(6), 7. DOI: 10.3969\/j.issn.1671-0673.2014.06.001","journal-title":"Journal of Information Engineering University"},{"key":"e_1_3_2_1_21_1","article-title":"Fully homomorphic encryption scheme without Gaussian noise","author":"Mingxiang LI","year":"2017","unstructured":"Mingxiang LI , Zhao LIU , Mingyan ZHANG . 2017 . Fully homomorphic encryption scheme without Gaussian noise . Journal of Computer Applications , (Dec 2017) 37(12), 5. DOI: 10.11772\/j.issn.1001-9081.2017.12.3430 10.11772\/j.issn.1001-9081.2017.12.3430 Mingxiang LI, Zhao LIU, Mingyan ZHANG. 2017. Fully homomorphic encryption scheme without Gaussian noise. Journal of Computer Applications, (Dec 2017) 37(12), 5. DOI: 10.11772\/j.issn.1001-9081.2017.12.3430","journal-title":"Journal of Computer Applications"},{"key":"#cr-split#-e_1_3_2_1_22_1.1","unstructured":"Xinlan ZHANG Yushun LU. 2018. Identity-based Fully Homomorphic Encryption from LWR. Software Guide. (Oct 2018)17(10) 5. DOI: 10.11907\/rjdk.181219 10.11907\/rjdk.181219"},{"key":"#cr-split#-e_1_3_2_1_22_1.2","unstructured":"Xinlan ZHANG Yushun LU. 2018. Identity-based Fully Homomorphic Encryption from LWR. Software Guide. (Oct 2018)17(10) 5. DOI: 10.11907\/rjdk.181219"},{"volume-title":"Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting","author":"Xaing XIE","key":"e_1_3_2_1_23_1","unstructured":"Xaing XIE , Rui XUE , Rui ZHANG . 2012. Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting . Springer , Berlin, Heidelberg . DOI: 10.1007\/978-3-642-32928-9_1 10.1007\/978-3-642-32928-9_1 Xaing XIE, Rui XUE, Rui ZHANG. 2012. Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting. Springer, Berlin, Heidelberg. DOI: 10.1007\/978-3-642-32928-9_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/1816393","article-title":"Deterministic identity-based encryption from lattice-based pro-grammable hash functions with high min-entropy","volume":"2019","author":"Daode ZHANG","year":"2019","unstructured":"Daode ZHANG , Jie LI , Bao LI , Xianhui LU , Haiyang XUE . 2019 . Deterministic identity-based encryption from lattice-based pro-grammable hash functions with high min-entropy . Security and Communication Networks , 2019 , 1 - 12 . DOI: 10.1155\/2019\/1816393 10.1155\/2019 Daode ZHANG, Jie LI, Bao LI, Xianhui LU, Haiyang XUE. 2019. Deterministic identity-based encryption from lattice-based pro-grammable hash functions with high min-entropy. Security and Communication Networks, 2019, 1-12. DOI: 10.1155\/2019\/1816393","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"International Journal of Foundations of Computer Science (July 30) 31(5)","author":"Juyan LI","unstructured":"Juyan LI , Chunguang MA , Zhen GU. 2020. Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting . International Journal of Foundations of Computer Science (July 30) 31(5) , 1 - 17 . DOI:10.1142\/S0129054120500252 10.1142\/S0129054120500252 Juyan LI, Chunguang MA, Zhen GU. 2020. Multi-use deterministic public key proxy re-encryption from lattices in the auxiliary-input setting. International Journal of Foundations of Computer Science (July 30) 31(5), 1-17. DOI:10.1142\/S0129054120500252"},{"volume-title":"What about bob? the inadequacy of CPA security for proxy Re-encryption","author":"Aloni Cohen","key":"e_1_3_2_1_26_1","unstructured":"Aloni Cohen . 2019. What about bob? the inadequacy of CPA security for proxy Re-encryption . Springer , Cham . DOI:10.1007\/978-3-030-17259-6_10 10.1007\/978-3-030-17259-6_10 Aloni Cohen. 2019. What about bob? the inadequacy of CPA security for proxy Re-encryption. Springer, Cham. DOI:10.1007\/978-3-030-17259-6_10"},{"key":"e_1_3_2_1_27_1","volume-title":"Partha Sarathi Roy.","author":"Willy Susilo","year":"2021","unstructured":"Willy Susilo , Priyanka Dutta , Dung Hoang Duong , Partha Sarathi Roy. 2021 . Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model . https:\/\/doi.org\/10.1007\/978-3-030-88428-4_9 10.1007\/978-3-030-88428-4_9 Willy Susilo, Priyanka Dutta, Dung Hoang Duong, Partha Sarathi Roy. 2021. Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model. https:\/\/doi.org\/10.1007\/978-3-030-88428-4_9"},{"key":"e_1_3_2_1_28_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer","author":"Shweta Agrawal","year":"2010","unstructured":"Shweta Agrawal , Dan Boneh, Xavier Boyen . 2010 . Efficient Lattice (H)IBE in the Standard Model . Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer , Berlin, Heidelberg. https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-3-642-13190-5_28 Shweta Agrawal, Dan Boneh, Xavier Boyen. 2010. Efficient Lattice (H)IBE in the Standard Model. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg. https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-3-642-13190-5_28"},{"volume-title":"Tighter, Faster, Smaller","author":"Daniele Micciancio","key":"e_1_3_2_1_29_1","unstructured":"Daniele Micciancio , Chris Peikert. 2012. Trapdoors for Lattices: Simpler , Tighter, Faster, Smaller . Springer Berlin Heidelberg. Springer Berlin Heidelberg . https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-290-11-4_41 Daniele Micciancio, Chris Peikert. 2012. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. Springer Berlin Heidelberg. Springer Berlin Heidelberg. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-290-11-4_41"},{"key":"e_1_3_2_1_30_1","volume-title":"STOC 2015:469-477","author":"Sergey Gorbunov","year":"2015","unstructured":"Sergey Gorbunov , Vinod Vaikuntanathan, Daniel Wichs . 2015 . Leveled fully homomorphic signatures from standard lattices . STOC 2015:469-477 . https:\/\/doi.org\/10.1145\/2746539.2746576 10.1145\/2746539.2746576 Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs. 2015. Leveled fully homomorphic signatures from standard lattices. STOC 2015:469-477. https:\/\/doi.org\/10.1145\/2746539.2746576"},{"key":"e_1_3_2_1_31_1","first-page":"1199","volume-title":"Application Research of Computers, (Apr. 2021)","author":"Yongli TANG","year":"2021","unstructured":"Yongli TANG , Qi LIU , Xiaohang ZHANG , Qing YE , Yongjun WANG . 2021 . Identity-based proxy re-encryption scheme based on RLWE problem . Application Research of Computers, (Apr. 2021) 38(4), 1199 - 1202 . http:\/\/www.arocmag.com\/article\/01-2021-04-045.html Yongli TANG, Qi LIU, Xiaohang ZHANG, Qing YE,Yongjun WANG. 2021. Identity-based proxy re-encryption scheme based on RLWE problem. Application Research of Computers, (Apr. 2021)38(4), 1199-1202. http:\/\/www.arocmag.com\/article\/01-2021-04-045.html"}],"event":{"name":"CSAE 2022: The 6th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2022","location":"Virtual Event China"},"container-title":["The 6th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565387.3565411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3565387.3565411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:13Z","timestamp":1750178233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3565387.3565411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":34,"alternative-id":["10.1145\/3565387.3565411","10.1145\/3565387"],"URL":"https:\/\/doi.org\/10.1145\/3565387.3565411","relation":{},"subject":[],"published":{"date-parts":[[2022,10,21]]}}}