Sign in

Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption.

Intae KimWilly SusiloJoonsang BaekJongkil Kim
Published in: IEEE Trans. Dependable Secur. Comput. (2022)
Keyphrases
  • attribute based encryption
  • ciphertext
  • standard model
  • access structure
  • encryption scheme
  • secret key
  • proxy re encryption
  • public key
  • metric space
  • private key
  • nearest neighbor
  • low cost
  • multi attribute
  • diffie hellman