A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage.
Wei LuoWenping MaPublished in: ICCCS (2) (2018)
Keyphrases
- cloud storage
- ciphertext
- cloud computing
- encryption scheme
- standard model
- key management
- private key
- secret key
- diffie hellman
- distributed computing
- signature scheme
- file system
- key distribution
- public key
- encryption algorithm
- computing resources
- service providers
- signcryption scheme
- database
- data sharing
- security analysis
- operating system
- databases