Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.
Ruizhong DuTianhe ZhangPublished in: SecureComm (2022)
Keyphrases
- control scheme
- ciphertext
- closed loop
- attribute based encryption
- control strategy
- control system
- standard model
- dynamic model
- robot manipulators
- control law
- controller design
- predictive control
- pid controller
- control loop
- robotic manipulator
- fuzzy controller
- proxy re encryption
- heat exchanger
- secret key
- access structure
- encryption scheme
- public key
- access control
- real time
- access control policies
- neural network controller
- neuro fuzzy
- similarity measure
- fault tolerant control
- search engine