Login / Signup
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
Xiaoyi Li
Kaitai Liang
Zhen Liu
Duncan S. Wong
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
key management
database
access control
security issues
databases
cost effective