Computation Delegation Using Circuits Hiding Key-Policy Attribute-Based Encryption
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 102 === In cloud computing, large data and complex calculations were divided into smaller processes and assigned dynamically to different virtual servers in the cloud for computation. With the increased in data transmissions across platforms and servers, data encryptio...
Main Authors: | Wu, Shu-Yi, 吳姝儀 |
---|---|
Other Authors: | Ting, Pei-Yih |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/7m2yq9 |
Similar Items
-
Attribute Hiding Key-Policy Attribute-Based Encryption
by: Jian-Wei Cai, et al.
Published: (2013) -
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
by: Qiang Wang, et al.
Published: (2018-01-01) -
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT
by: Yanfeng Shi, et al.
Published: (2021-01-01) -
Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System
by: Xi Chen, et al.
Published: (2020-01-01) -
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing
by: Jianfei Sun, et al.
Published: (2018-01-01)