Login / Signup
An identity-based cryptographic scheme for cloud storage applications.
Manel Medhioub
Mohamed Hamdi
Published in:
Int. J. Grid Util. Comput. (2019)
Keyphrases
</>
cloud storage
key management
ciphertext
encryption scheme
key distribution
provably secure
cloud computing
proxy re encryption
smart card
hash functions
signcryption scheme
distributed computing
public key cryptography
wireless sensor networks
standard model
encrypted data