Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
67
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 82 publications
(67 citation statements)
references
References 10 publications
0
67
0
Order By: Relevance
“…Based on the works of Boneh et al and Menezes et al, the required computational time sequence of different operations is T H ≈ T M < T J < T R < T E ≤ T Q < T P . Thus, the scheme is efficient than others during the key extraction and encryption and better than schemes in other works and nearly equal to Cocks's scheme during decryption of a message. On the other side, in QRDVS scheme, the computation time for a given input message mainly depends on the time required to generate and verify the signature.…”
Section: Further Discussion On the Qribe And Qrdvs Schemesmentioning
confidence: 99%
“…Based on the works of Boneh et al and Menezes et al, the required computational time sequence of different operations is T H ≈ T M < T J < T R < T E ≤ T Q < T P . Thus, the scheme is efficient than others during the key extraction and encryption and better than schemes in other works and nearly equal to Cocks's scheme during decryption of a message. On the other side, in QRDVS scheme, the computation time for a given input message mainly depends on the time required to generate and verify the signature.…”
Section: Further Discussion On the Qribe And Qrdvs Schemesmentioning
confidence: 99%
“…Huang et al [15] introduced a novel public key encryption with authorized equality warrants on all of its ciphertext or a specified ciphertext. To strengthen the securing requirement, Wu et al [16] proposed an efficient and secure identity-based encryption scheme with equality test in cloud computing. Xu et al [17] proposed a CP-ABE using bilinear pairing to provide users with searching capability on ciphertext and fine-grained access control.…”
Section: Related Workmentioning
confidence: 99%
“…There are four methods used to encrypt for protecting data at rest, those are; level at entire memory disk, level at index, point at organizer with level of submission. In the case of complex task meant for realization such of those approaches secret information key execution for information content protection methodology [3].…”
Section: Introductionmentioning
confidence: 99%