Login / Signup
Outsourcing Decryption of Multi-Authority ABE Ciphertexts.
Keying Li
Hua Ma
Published in:
Int. J. Netw. Secur. (2014)
Keyphrases
</>
ciphertext
standard model
encryption scheme
information technology
attribute based encryption
public key
access structure
encryption algorithm
secret key
business process
similarity measure
databases
real time
link analysis
s box
data mining
neural network