Login / Signup
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
Mitsuhiro Hattori
Takato Hirano
Takashi Ito
Nori Matsuda
Takumi Mori
Yusuke Sakai
Kazuo Ohta
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
</>
ciphertext
attribute based encryption
standard model
encryption scheme
secret key
public key
proxy re encryption
access structure
cca secure
encryption algorithm
databases
private key
smart card
chosen plaintext attack
identity based encryption
diffie hellman
key management
public key encryption