Login / Signup
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT.
Yang Li
Qingyang Zhang
Jun Cheng
Yiyuan Zhou
Jie Cui
Hong Zhong
Published in:
NaNA (2023)
Keyphrases
</>
encryption scheme
secret sharing
secret sharing scheme
standard model
security analysis
public key
service providers
ciphertext
cca secure
diffie hellman
data sharing
lossless compression
secret key
image encryption scheme
encryption algorithm
security model
image processing
databases
database