What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.
Weijing YouLei LeiBo ChenLimin LiuPublished in: Inf. (2021)
Keyphrases
- cloud storage
- ciphertext
- encryption scheme
- standard model
- private key
- cloud computing
- secret key
- encrypted data
- diffie hellman
- third party
- file system
- distributed computing
- public key
- sensitive data
- key management
- security analysis
- encryption algorithm
- key establishment
- key exchange
- service providers
- data hiding
- image encryption
- computing resources
- intrusion detection
- low cost
- databases