An Improved Cloud Based Revocable Identity Based Proxy Re encryption Scheme

arronone 28 0 PDF 2021-02-15 21:02:24

Key revocation and ciphertext update are two prominent security requirements for identity-based encryption systems from a practical view. Several solutions to offer efficient key revocation or ciphertext update for identity-based encryption systems have been proposed in the literature. However, how

用户评论
请输入评论内容
评分:
暂无评论