您当前的位置:
首页 >
文章列表页 >
Efficient revocable attribute-based encryption scheme
Topics: Network Attack, Defense and Security Metrics | 更新时间:2024-06-05
    • Efficient revocable attribute-based encryption scheme

    • Journal on Communications   Vol. 40, Issue 6, Pages: 32-39(2019)
    • DOI:10.11959/j.issn.1000-436x.2019150    

      CLC: TN918
    • Online First:2019-06

      Published:25 June 2019

    移动端阅览

  • Xuejun LI, Dan ZHANG, Hui LI. Efficient revocable attribute-based encryption scheme[J]. Journal on Communications, 2019, 40(6): 32-39. DOI: 10.11959/j.issn.1000-436x.2019150.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2093

下载量

6

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Multi-authority attribute-based access control system in mHealth with traceability
Multi-authority attribute-based encryption scheme with policy dynamic updating
Data sharing scheme supporting secure outsourced computation in wireless body area network

Related Author

Pengliang SHI
Tianhe ZHANG
Ruizhong DU
Zhiqiang ZHU
Jianhua WANG
Zhiyuan ZHAO
Lei SUN
Jinbo XIONG

Related Institution

Key Lab on High Trusted Information System in Hebei Province
School of Cyber Security and Computer, Hebei University
Troops 61516
The Third Institute,Strategic Support Force Information Engineering University
College of Mathematics and Informatics, Fujian Normal University
0