Login / Signup
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
Zechao Liu
Zoe Lin Jiang
Xuan Wang
Siu-Ming Yiu
Published in:
J. Netw. Comput. Appl. (2018)
Keyphrases
</>
ciphertext
attribute based encryption
public key
standard model
encryption scheme
secret key
information technology
attribute values
key distribution
low cost
e government
data management
service providers
similarity search
private key
diffie hellman