A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption.
Nizamud DinArif Iqbal UmarAbdul WaheedNoor Ul AminPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- big data
- signcryption scheme
- cloud computing
- ring signature
- data analysis
- big data analytics
- data processing
- data management
- security properties
- business intelligence
- standard model
- key management
- bilinear pairings
- vast amounts of data
- data warehousing
- social media
- unstructured data
- electronic voting
- signature scheme
- digital images
- massive data
- access control
- business analytics
- knowledge discovery
- databases
- data driven decision making
- commodity hardware
- provably secure
- diffie hellman
- security analysis
- encryption scheme
- machine learning