Back to Results
First PageMeta Content



Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme∗ Keying Li1†, Jianfeng Wang2 , Yinghui Zhang3 , and Hua Ma1 of mathematics and statistics, Xidian University, P.R.China and ma
Add to Reading List

Document Date: 2014-05-12 01:06:33


Open Document

File Size: 1,02 MB

Share Result on Facebook

City

key policy attribute / Policy Attribute / /

Company

Collaborative Systems / National Engineering Laboratory / P.R. China State Key Laboratory / State Key Laboratory / /

Country

China / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

State Key Laboratory of Integrated Service Networks Xidian University / Institute of Information Engineering / P.R. China State Key Laboratory of Information Security / Xidian University / Wireless Security Xi’an University of Posts / /

IndustryTerm

setup algorithm / cloud server / Internet Services / decryption algorithm / cloud computing technologies / above algorithms / probabilistic polynomialtime algorithm / cloud computing environments / computing and storage capability as services / computing / cloud computing / encryption algorithm / /

Organization

Chinese Academy of Sciences / Integrated Service Networks Xidian University / Institute of Information Engineering / Xidian University / Wireless Security Xi’an University of Posts and Telecommunications / /

Person

ABE CT / /

/

Position

secretary / Corresponding Author / teacher / /

Product

S1 / /

ProgrammingLanguage

R / /

Technology

attribute-based proxy re-encryption / above algorithms / three algorithms / 76 Key Policy Attribute-based Proxy Re-encryption / encryption algorithm / PKI / 71 Key Policy Attribute-based Proxy Re-encryption / Setup algorithm / 75 Key Policy Attribute-based Proxy Re-encryption / proxy re-encryption / identity-based encryption / private key / probabilistic polynomialtime algorithm / secret key / Re-Enc algorithm / type-based proxy re-encryption / attribute-based encryption / TransformKey algorithms / encryption / KeyGen algorithm / Transform key algorithm / public key / 74 Key Policy Attribute-based Proxy Re-encryption / 73 Key Policy Attribute-based Proxy Re-encryption / six algorithms / 77 Key Policy Attribute-based Proxy Re-encryption / TransformKey algorithm / cloud computing technologies / encryption system / 15929802458 70 Key Policy Attribute-based Proxy Re-encryption / 72 Key Policy Attribute-based Proxy Re-encryption / 78 Key Policy Attribute-based Proxy Re-encryption / attribute -based encryption / simulation / Encrypt algorithm / decryption algorithm / identity-based proxy re-encryption / /

URL

http /

SocialTag