Login / Signup

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.

Xin TangLinna ZhouYongfeng HuangChin-Chen Chang
Published in: TrustCom/BigDataSE (2018)
Keyphrases
  • cost effective
  • encryption scheme
  • databases
  • user interface
  • information systems
  • third party