Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds.
Fucai LuoHaiyan WangWilly SusiloXingfu YanXiaofan ZhengPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- data sharing
- encryption scheme
- proxy re encryption
- public key encryption
- standard model
- ciphertext
- cca secure
- data access
- security model
- peer to peer
- diffie hellman
- security analysis
- information sharing
- data integration
- keyword search
- public key
- homomorphic encryption
- sensitive data
- cloud computing
- privacy protection
- private key
- government agencies
- information retrieval
- secret sharing scheme
- smart card
- identity based encryption
- information systems
- security requirements
- provably secure