High Impact Factor : 7.883
Submit your paper here

Impact Factor

7.883


Call For Paper

Volume: 11 Issue 01 January 2025


Download Paper Format


Copyright Form


Share on

Proxy Re-encryption Scheme For Cloud Computing With Public Verifier

  • Author(s):

    S. R. Ashmi | Mrs. M. Supriya, M.E, Ph.D

  • Keywords:

    Access Control, Attribute-based Encryption, Blockchain, Secure Search, Attribute Revocation.

  • Abstract:

    With The Rapid Development Of Cloud Computing Technology, How To Achieve Secure Access To Cloud Data Has Become A Current Research Hotspot. Attribute-based Encryption Technology Provides The Feasibility To Achieve The Above Goal. However, Most Of The Exis

Other Details

  • Paper id:

    IJSARTV9I1072449

  • Published in:

    Volume: 9 Issue: 10 October 2023

  • Publication Date:

    2023-10-06


Download Article