Login / Signup
Matrix Access structure Policy used in Attribute-Based Proxy Re-encryption
Keying Li
Published in:
CoRR (2013)
Keyphrases
</>
access structure
ciphertext
proxy re encryption
standard model
multi attribute
encryption scheme
secret key
public key
secret sharing scheme
range queries
access methods
metric space
utility function
keyword search
security model