Login / Signup
New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing.
Hadis Hafizpour
Mohammad Ebrahim Shiri
Amir Masoud Rahmani
Published in:
Concurr. Comput. Pract. Exp. (2023)
Keyphrases
</>
encryption scheme
security analysis
public key encryption
public key
standard model
ciphertext
trusted platform module
secret key
authentication protocol
security model
cca secure
relational databases
privacy preserving
data sharing
encryption algorithm
private key