Verifiable access control scheme based on unpaired CP-ABE in fog computing

Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality an...

Olles dieđut

Bibliográfalaš dieđut
Váldodahkkit: Jiangtao DONG, Peiwen YAN, Ruizhong DU
Materiálatiipa: Artihkal
Giella:zho
Almmustuhtton: Editorial Department of Journal on Communications 2021-08-01
Ráidu:Tongxin xuebao
Fáttát:
Liŋkkat:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/