Return to Article Details Survey on Identity-Based Encryption with Outsourced Revocation in Cloud Computing Download Download PDF