4 research outputs found

    The high level idea of enabling keyword search over re-encrypted ciphertext by re-encryption.

    No full text
    <p>The high level idea of enabling keyword search over re-encrypted ciphertext by re-encryption.</p

    Property summary for PRES, ABE, ABPRE, ABKS in the literature and the solution in this paper.

    No full text
    <p>Property summary for PRES, ABE, ABPRE, ABKS in the literature and the solution in this paper.</p

    System model of attribute-based access control for proxy re-encryption with keyword search.

    No full text
    <p>System model of attribute-based access control for proxy re-encryption with keyword search.</p

    Sequence diagram for using in the application where the data owner shares his medical records with some professionals such that only authorized professionals can retrieve medical records of their interests.

    No full text
    <p>Sequence diagram for using in the application where the data owner shares his medical records with some professionals such that only authorized professionals can retrieve medical records of their interests.</p
    corecore