Login / Signup

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.

Junggab SonDonghyun KimMd. Zakirul Alam BhuiyanRasheed HussainHeekuck Oh
Published in: Concurr. Comput. Pract. Exp. (2017)
Keyphrases
  • proxy re encryption
  • standard model
  • information systems
  • information technology
  • mobile devices
  • security model
  • ciphertext
  • database
  • service providers
  • bitstream
  • keyword search
  • encryption scheme
  • public key encryption