Login / Signup
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Yutaka Kawai
Published in:
ISPEC (2015)
Keyphrases
</>
ciphertext
proxy re encryption
standard model
encryption scheme
secret key
public key encryption
identity based encryption
public key
encryption algorithm
cca secure
private key
information systems
lightweight
security analysis
diffie hellman
signature scheme
databases
database