E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption.
Vijayakumar VaradharajanPriyan Malarvizhi KumarGandhi UshadeviR. VaratharajanGunasekaran ManogaranPrathamesh Vijay TararePublished in: Mob. Networks Appl. (2019)
Keyphrases
- proxy re encryption
- security model
- public key encryption
- standard model
- encryption scheme
- cca secure
- identity based encryption
- access control
- cloud computing
- ciphertext
- public key
- keyword search
- private key
- security requirements
- security issues
- public key cryptosystem
- information security
- security policies
- provably secure
- diffie hellman
- security analysis
- cloud services
- security mechanisms
- data model
- security protocols