Cloud storageAccess controlCiphertext-policy attribute-based encryptionHierarchical cryptography architectureAttribute revocation
This work is supported by the National Natural Science Foundation of ChinaThis work is supported by the National Natural Science Foundation of China
6137304061772385
2019