An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Jing LiZhitao GuanXiaojiang DuZijian ZhangJun WuPublished in: ICC (2017)
Keyphrases
- encryption scheme
- cloud computing
- service providers
- secret sharing
- standard model
- secret sharing scheme
- data center
- security analysis
- middleware architecture
- ciphertext
- cloud computing environment
- data management
- secret key
- mobile devices
- public key
- cloud computing platform
- data privacy
- hash functions
- encrypted data
- encryption algorithm
- data sharing
- security issues
- mobile applications
- database
- sensor networks
- cloud services
- data sources
- data model
- database systems