Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Guiyi WeiJun ShaoYang XiangPingping ZhuRongxing LuPublished in: Inf. Sci. (2015)
Keyphrases
- big data
- signcryption scheme
- bilinear pairings
- key management
- social media
- data processing
- big data analytics
- vast amounts of data
- data management
- ring signature
- standard model
- cloud computing
- data analysis
- data science
- unstructured data
- business intelligence
- knowledge discovery
- security properties
- massive data
- digital images
- data warehousing
- business analytics
- diffie hellman
- signature scheme
- electronic voting
- association rules
- key distribution
- massive datasets
- commodity hardware
- decision support
- data sources
- access control
- encryption scheme
- information technology
- information retrieval