Login / Signup
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing.
Shanshan Tu
Muhammad Waqas
Fengming Huang
Ghulam Abbas
Ziaul Haq Abbas
Published in:
Comput. Networks (2021)
Keyphrases
</>
encryption scheme
security analysis
standard model
data sharing
public key
secret key
encryption algorithm
cca secure
lossless compression
ciphertext
diffie hellman
databases
proxy re encryption
encryption key
public key encryption
image compression
digital libraries