Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage
博士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the above public key and encrypts a message with this key. Only the owner of SK, the receiver, can decrypt the ciphe...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/69505113963058303313 |