Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage

博士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the above public key and encrypts a message with this key. Only the owner of SK, the receiver, can decrypt the ciphe...

Full description

Bibliographic Details
Main Authors: Shi-Yuan Huang, 黃士原
Other Authors: Chun-I Fan
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/69505113963058303313