Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT.
Sina AbdollahiJavad MohajeriMahmoud SalmasizadehPublished in: ISC Int. J. Inf. Secur. (2023)
Keyphrases
- highly efficient
- ciphertext
- standard model
- constraint programming
- management system
- encryption scheme
- information technology
- secret key
- low cost
- service providers
- information systems
- cloud computing
- security model
- big data
- encryption algorithm
- public key
- key management
- ring signature scheme
- low latency
- location information
- low complexity
- secure communication
- backtrack search
- security analysis
- lower bound
- reinforcement learning