Login / Signup

Identity-based encryption with equality test and datestamp-based authorization mechanism.

Xi Jun LinQihui WangLin SunHaipeng Qu
Published in: Theor. Comput. Sci. (2021)
Keyphrases
  • access control
  • databases
  • conflict resolution
  • public key