Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting.
Subhranil DuttaTapas PalRatna DuttaPublished in: Theor. Comput. Sci. (2024)
Keyphrases
- cloud computing
- key management
- security issues
- identity management
- security services
- encryption scheme
- key distribution
- data privacy
- cloud storage
- encrypted data
- ciphertext
- ad hoc networks
- digital signature
- computing resources
- secret key
- wireless sensor networks
- resource constrained
- public key cryptography
- cloud computing environment
- public key
- trusted third party
- data management
- provably secure
- security protocols
- security mechanisms
- data center
- security properties
- service providers
- authentication protocol
- private key
- security analysis
- signcryption scheme
- cloud computing platform
- blind signature
- elliptic curve
- cloud services
- signature scheme
- diffie hellman
- peer to peer
- cca secure
- database
- fault tolerant
- blind signature scheme
- electronic payment
- private cloud
- information sharing
- database systems
- databases