Lattice-based public key searchable encryption with fine-grained access control for edge computing.
Peng WangBiwen ChenTao XiangZhongming WangPublished in: Future Gener. Comput. Syst. (2022)
Keyphrases
- public key
- public key cryptography
- digital signature
- encryption scheme
- private key
- security analysis
- elliptic curve cryptography
- secret key
- image authentication
- ciphertext
- signature scheme
- security model
- public key infrastructure
- elliptic curve
- authentication scheme
- identity based encryption
- authentication protocol
- key exchange
- security properties
- standard model
- image encryption
- diffie hellman
- provably secure
- database systems
- secret sharing scheme
- high security
- encryption algorithm
- database management systems
- data management