Skip to main navigation
Skip to search
Skip to main content
Hamad Bin Khalifa University Home
Home
Profiles
Research units
Projects
Research output
Activities
Courses
Student theses
Search by expertise, name or affiliation
Revocable attribute-based proxy re-encryption
Fucai Luo
*
,
Saif Al-Kuwari
*
Corresponding author for this work
CSE Information & Computing Technology
Hamad bin Khalifa University
Research output
:
Contribution to journal
›
Article
›
peer-review
8
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Revocable attribute-based proxy re-encryption'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Attribute-based Proxy Re-encryption
100%
Revocation Mechanism
50%
Access Policy
33%
Encryption Key
33%
Ciphertext
33%
Attribute-based Encryption
33%
Proxy Re-encryption
33%
Efficient Revocation
33%
Decryption
33%
Untrusted Environment
16%
Trusted Proxy
16%
Plaintext
16%
Lattice-based
16%
Encrypted Data
16%
Instantiation
16%
Learning with Errors Problem
16%
Identity-based Encryption
16%
Security Model
16%
Chosen-plaintext Attack
16%
Predicate Encryption
16%
Data Needs
16%
Cloud Storage
16%
Computer Science
proxy re encryption
100%
Attribute-Based Encryption
25%
encryption key
25%
Ciphertext
25%
Security Model
12%
identity based encryption
12%
Instantiation
12%
Encrypted Data
12%
Plaintext Attack
12%
Untrusted Environment
12%
Cloud Storage
12%
Learning with Errors
12%