Login / Signup
CP-ABE with outsourced decryption and directionally hidden policy.
Zhiwei Wang
Wenyang Liu
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
ciphertext
attribute based encryption
standard model
encryption scheme
access structure
third party
secret key
constraint programming
encryption algorithm
service providers
optimal policy
asymptotically optimal
reinforcement learning
decision process
expected cost
policy making