Sign in
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Gaurav Pareek
B. R. Purushothama
Published in:
SECRYPT (2017)
Keyphrases
</>
encryption scheme
proxy re encryption
lightweight
standard model