Login / Signup
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Xinyu Feng
Cong Li
Dan Li
Yuejian Fang
Qingni Shen
Published in:
ICICS (2017)
Keyphrases
</>
ciphertext
attribute based encryption
proxy re encryption
standard model
public key encryption
encryption scheme
secret key
cca secure
public key
identity based encryption
private key
security model
diffie hellman
databases
database systems
security analysis
smart card