Verifiable access control scheme based on unpaired CP-ABE in fog computing

Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality an...

Full description

Bibliographic Details
Main Authors: Jiangtao DONG, Peiwen YAN, Ruizhong DU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021162/