Traceable Multiauthority Attribute‐Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
Author(s) -
Suhui Liu,
Jiguo Yu,
Chunqiang Hu,
Mengmeng Li
Publication year - 2021
Publication title -
wireless communications and mobile computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.42
H-Index - 64
eISSN - 1530-8677
pISSN - 1530-8669
DOI - 10.1155/2021/6682580
Subject(s) - computer science , encryption , computer security , attribute based encryption , database , data mining , public key cryptography
School of Computer Science, Qufu Normal University, Rizhao, 276826 Shandong, China School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Sciences), Jinan, Shandong 250353, China Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan, Shandong 250014, China Shandong Laboratory of Computer Networks, Jinan 250014, China School of Big Data and Software Engineering, Chongqing University, Chongqing 400044, China Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education (Chongqing University), China
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom