2022 7th International Conference on Signal and Image Processing (ICSIP) 2022
DOI: 10.1109/icsip55141.2022.9887218
|View full text |Cite
|
Sign up to set email alerts
|

Security Verification of Key Exchange in Ciphertext-Policy Attribute Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Because of this main advantage, ABE is used in many applications in the area of distributed data management, specified broadcast or data storage related to 3rd parties. Also, ABE is very critical when verifying its security properties via the use of alternative protocols (Bat-Erdene et al 2022). The public key encryption is widely accepted in order to secure various systems.…”
Section: Introductionmentioning
confidence: 99%
“…Because of this main advantage, ABE is used in many applications in the area of distributed data management, specified broadcast or data storage related to 3rd parties. Also, ABE is very critical when verifying its security properties via the use of alternative protocols (Bat-Erdene et al 2022). The public key encryption is widely accepted in order to secure various systems.…”
Section: Introductionmentioning
confidence: 99%