Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Mingwu ZhangYan JiangHua ShenBingbing LiWilly SusiloPublished in: Inscrypt (2018)
Keyphrases
- encryption scheme
- data sharing
- cca secure
- secret sharing
- secret sharing scheme
- public key encryption scheme
- standard model
- security analysis
- data access
- data integration
- ciphertext
- diffie hellman
- data privacy
- peer to peer
- identity based encryption
- information sharing
- proxy re encryption
- public key cryptosystem
- encryption algorithm
- private key
- sensitive data
- public key
- database applications
- cloud computing
- data model