Sign in

Offline/online attribute-based encryption with verifiable outsourced decryption.

Zechao LiuZoe Lin JiangXuan WangXinyi HuangSiu-Ming YiuKunihiko Sadakane
Published in: Concurr. Comput. Pract. Exp. (2017)
Keyphrases
  • ciphertext
  • real time
  • third party
  • standard model
  • multi dimensional
  • decision makers
  • service providers
  • encryption scheme