Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme.
ShrutiShalli RaniGautam SrivastavaPublished in: Expert Syst. Appl. (2024)
Keyphrases
- encryption scheme
- security analysis
- standard model
- identity based encryption
- cca secure
- diffie hellman
- public key
- public key encryption
- encryption key
- data sharing
- secret sharing scheme
- provably secure
- homomorphic encryption
- secret key
- ciphertext
- key exchange
- encryption algorithm
- security model
- proxy re encryption
- digital signature
- public key cryptosystem
- lossless compression
- public key cryptosystems