A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage.
Haiyong WangYao PengPublished in: ICCCS (2) (2018)
Keyphrases
- ciphertext
- control scheme
- cloud storage
- proxy re encryption
- standard model
- closed loop
- control system
- control strategy
- secret key
- encryption scheme
- dynamic model
- public key
- cloud computing
- access control
- security model
- encryption algorithm
- smart card
- databases
- experimental data
- wavelet transform
- relational databases
- keywords