Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data.
Siqi YuYang CuiFengyin LiPublished in: DMBD (2) (2021)
Keyphrases
- big data
- authentication scheme
- public key
- signature scheme
- bilinear pairings
- public key cryptography
- key management
- secret key
- cloud computing
- smart card
- security model
- data management
- provably secure
- user authentication
- standard model
- data warehousing
- high volume
- data analysis
- authentication protocol
- big data analytics
- blind signature scheme
- social media
- data processing
- digital signature
- blind signature
- diffie hellman
- security analysis
- business intelligence
- original signer
- signcryption scheme
- knowledge discovery
- resource constrained
- data warehouse
- case study
- private key
- low cost
- machine learning
- databases