Login / Signup
An Identity-Based Encryption Scheme for Data Security in Fog Computing.
Nishat Farjana
Shanto Roy
Md. Julkar Nayeen Mahi
Md Whaiduzzaman
Published in:
IJCCI (2018)
Keyphrases
</>
encryption scheme
data security
data sharing
access control
data privacy
standard model
data centric
public key
data management
ciphertext
data integrity
proxy re encryption
diffie hellman
identity based encryption
secret key
cca secure
signcryption scheme
security model
lossless compression
data access
privacy preserving data mining
provably secure
public key cryptosystem