Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption Scheme.
Masoomeh SepehriAlberto TrombettaMaryam SepehriPublished in: J. Cyber Secur. Mobil. (2017)
Keyphrases
- encryption scheme
- data sharing
- homomorphic encryption
- standard model
- security analysis
- provably secure
- diffie hellman
- data integration
- data access
- information sharing
- peer to peer
- cca secure
- data privacy
- ciphertext
- public key encryption
- secret sharing scheme
- privacy protection
- security model
- encryption algorithm
- encryption key
- sensitive data
- data management
- data sets
- cost effective
- privacy preserving
- knowledge discovery
- proxy re encryption
- wireless sensor networks
- multimedia