Login / Signup
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.
Xingbing Fu
Xunyun Nie
Fagen Li
Published in:
Int. J. Netw. Secur. (2017)
Keyphrases
</>
encryption scheme
ciphertext
standard model
secret key
public key
cca secure
proxy re encryption
security analysis
diffie hellman
secret sharing scheme
encryption algorithm
lossless compression
data sharing
identity based encryption
hash functions
chosen plaintext attack
public key encryption
secret sharing