Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Zuoxia YuMan Ho AuRupeng YangJunzuo LaiQiuliang XuPublished in: AsiaCCS (2018)
Keyphrases
- proxy re encryption
- security model
- ciphertext
- standard model
- public key
- public key encryption
- access control
- information technology
- secret key
- encryption scheme
- keyword search
- security requirements
- security analysis
- information systems
- service providers
- data structure
- identity based encryption
- low cost
- information retrieval
- provably secure