Kazuki Takayama

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The secure storage systems adopting the encrypt-on-disk scheme, in which files are stored in cipher for efficient data transmission, need to re-encrypt files with new cryptographic keys when a revocation occurs. There are two re-encryption methods, namely active revocation in which the re-encryption is immediately performed and lazy revocation in which the(More)
  • 1