AN EFFICIENT POST-QUANTUM ATTRIBUTE BASED ENCRYPTION SCHEME BASED ON RANK METRIC CODES FOR CLOUD COMPUTING
Keywords:
One useful method for protecting sensitive information in the cloud is attribute-based encryption. The data owner may safely store and exchange data inside the cloud environment using this cryptographic primitive. However, quantum computers have come a long way in the last few years, and this has sparked optimism that we may finally be able to solve some of mathematics's most perplexing issues, such as decimal factoring and calculating discrete logarithms of big numbers.Abstract
One useful method for protecting sensitive information in the cloud is attribute-based encryption. The data owner may safely store and exchange data inside the cloud environment using this cryptographic primitive. However, quantum computers have come a long way in the last few years, and this has sparked optimism that we may finally be able to solve some of mathematics's most perplexing issues, such as decimal factoring and calculating discrete logarithms of big numbers.
Downloads
References
S. Choudhury, K. Bhatnagar, and W. Haque, Public Key Infrastructure Implementation and Design. Hoboken, NJ, USA: Wiley, 2002.
A. Shamir, „„Identity-based cryptosystems and signature schemes,‟‟ in Proc. Workshop Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 1984, pp. 47–53.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.