Login / Signup
Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage.
Yuanyou Cui
Yunxuan Su
Zheng Tu
Jindan Zhang
Published in:
Int. J. Grid Util. Comput. (2023)
Keyphrases
</>
cloud storage
ciphertext
proxy re encryption
cloud computing
key management
encryption scheme
standard model
service providers
key distribution
distributed computing
file system
information systems
bilinear pairings
secret key
databases
security model
access control
private key
diffie hellman
signcryption scheme