Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud

2019 ◽  
Vol 93 ◽  
pp. 770-776 ◽  
Author(s):  
Zhiwei Wang
2014 ◽  
Vol 19 (4) ◽  
pp. 398-405 ◽  
Author(s):  
Liang-liang Wang ◽  
Ke-fei Chen ◽  
Xian-ping Mao ◽  
Yong-tao Wang

2017 ◽  
Vol 66 (5) ◽  
pp. 891-904 ◽  
Author(s):  
Sikhar Patranabis ◽  
Yash Shrivastava ◽  
Debdeep Mukhopadhyay

Author(s):  
V.Jai kumar ◽  
K. Sathish

Cloud computing has been envision as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the brought together huge server farms. A conveyed stockpiling system, containing a grouping of limit laborers, gives long stretch amassing organizations over the Internet. Putting away information in an outsider's cloud framework causes genuine worry over information mystery specifically, to accomplish effective information elements, we improve the current confirmation of capacity models by controlling square label verification. To help proficient treatment of different reviewing undertakings, we further investigate the method of mark to expand our primary outcome into a multi-client setting, where TPA can play out numerous evaluating errands all the while. Broad security and execution examination show that the proposed plans are profoundly proficient and provably secure.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 3649-3659
Author(s):  
Chandrashekhar Meshram ◽  
Ahmed Alsanad ◽  
Jitendra V. Tembhurne ◽  
Shailendra W. Shende ◽  
Kailash Wamanrao Kalare ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document