Abstract: Ciphertext retrieval technology has been widely explored with the increasing popularity of cloud computing. Proxy re-encryption with Keyword search (PREKS) can support multi-user retrieval ...
Abstract: Access control schemes in predicate encryption can effectively reduce the risk of information leakage in the inner product function encryption (IPFE). However, when we try to transition from ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果