An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing.
Jing LiZhitao GuanXiaojiang DuZijian ZhangJun WuPublished in: CoRR (2018)
Keyphrases
- cloud computing
- encryption scheme
- service providers
- secret sharing
- middleware architecture
- standard model
- security analysis
- data center
- secret sharing scheme
- ciphertext
- public key
- data management
- cloud computing environment
- secret key
- encrypted data
- mobile devices
- data sharing
- hash functions
- third party
- encryption algorithm
- cloud computing platform
- lossless compression
- mobile users
- mobile applications
- security issues
- cloud services
- end users
- database systems
- data mining