Login / Signup
Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
Jin Li
Jingwei Li
Xiaofeng Chen
Chunfu Jia
Wenjing Lou
Published in:
IEEE Trans. Computers (2015)
Keyphrases
</>
cloud computing
service providers
public key
third party
computing resources
data center
data management
cloud computing environment
access control
proxy re encryption
security model
encryption scheme
standard model
security issues
digital signature
provably secure
key management
keyword search
database
ciphertext