Login / Signup
CCA-secure ABE with outsourced decryption for fog computing.
Cong Zuo
Jun Shao
Guiyi Wei
Mande Xie
Min Ji
Published in:
Future Gener. Comput. Syst. (2018)
Keyphrases
</>
ciphertext
cca secure
encryption scheme
standard model
proxy re encryption
secret key
public key encryption scheme
public key
third party
security analysis
security model
encryption algorithm
databases
database systems
digital images
network security