Login / Signup
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme.
Minqian Wang
Zhenfeng Zhang
Cheng Chen
Published in:
Concurr. Comput. Pract. Exp. (2016)
Keyphrases
</>
encryption scheme
privacy preserving
security analysis
ciphertext
standard model
public key
data sharing
data privacy
image encryption
security properties
peer to peer
diffie hellman
encryption algorithm
security model
privacy protection
proxy re encryption
user authentication
private key
secret key
authentication protocol
lossless compression
digital signature
sensitive information
authentication scheme
sensitive data
hash functions
compression algorithm
high dimensional
databases
database