Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.
Yanjiang YangLiang GuFeng BaoPublished in: INTRUST (2010)
Keyphrases
- encryption key
- trusted computing
- proxy re encryption
- encryption scheme
- standard model
- ciphertext
- computing environments
- security model
- computer security
- trusted platform module
- keyword search
- computing platform
- security analysis
- virtual organization
- cloud computing
- public key
- digital content
- secret key
- databases
- computing systems
- computer systems
- xml documents
- relational databases
- database systems
- search engine