Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Yunya ZhouHua DengQianhong WuBo QinJianwei LiuYong DingPublished in: Future Gener. Comput. Syst. (2016)
Keyphrases
- proxy re encryption
- standard model
- security model
- ciphertext
- keyword search
- identity based encryption
- access control
- public key
- encryption scheme
- public key encryption
- mobile devices
- signature scheme
- cloud computing
- relational databases
- cca secure
- diffie hellman
- security requirements
- database
- fault tolerant
- low cost
- video sequences
- information retrieval