Login / Signup
Revocable key aggregate searchable encryption with user privacy and anonymity.
Mukti Padhya
Devesh C. Jinwala
Published in:
Int. J. Inf. Comput. Secur. (2022)
Keyphrases
</>
user privacy
ring signature scheme
designated verifier
privacy preserving
malicious users
privacy preservation
security properties
digital libraries
identity management
data streams
context aware
location based services
encryption scheme
digital signature