Results 11 to 20 of about 453 (176)

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, Volume 17, Issue 4, Page 567-581, July 2023., 2023
RIB‐ME provides the features of data confidentiality, sender authenticity and efficient revocation, where the security can be reduced to static assumptions in the standard model. Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access ...
Zhe Jiang   +5 more
wiley   +1 more source

Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian   +5 more
wiley   +1 more source

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi   +21 more
wiley   +1 more source

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri   +3 more
wiley   +1 more source

Aggregatable Certificateless Designated Verifier Signature [PDF]

open access: yesIEEE Access, 2020
In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to be processed in a timely and efficient manner. Using aggregate signatures, it provides a secure and efficient way to handle large numbers of digital signatures with the same message. Recently, the
Pairat Thorncharoensri   +2 more
openaire   +3 more sources

Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]

open access: yesJisuanji gongcheng, 2023
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj   +1 more source

A Revocable Certificateless Signature Scheme [PDF]

open access: yesJournal of Computers, 2014
Certificateless public key cryptography (CLPKC), with properties of no key escrow and no certificate, has received a lot of attention since its invention. However, how to revoke a user in certificateless cryptosystem still remains a problem: the existing solutions are not practical for use due to either a costly mediator or enormous computation (secret
Yinxia Sun, Futai Zhang, Limin Shen
openaire   +1 more source

Certificateless Aggregate Signature Scheme for Privacy Protection in VANET [PDF]

open access: yesJisuanji gongcheng, 2020
In Vehicular Ad-hoc Network(VANET),problems such as vulnerable communication data and low computational efficiency are ubiquitous.This paper proposes a certificateless aggregation signature scheme based on certificateless public key cryptosystem and ...
ZHAO Nan, ZHANG Guoan, GU Xiaohui
doaj   +1 more source

Secure Data Fusion Analysis on Certificateless Short Signature Scheme Based on Integrated Neural Networks and Elliptic Curve Cryptography [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In the traditional public key cryptosystem based on certificates, the issuance and management of usercertificates are realized through the authoritative certificate center, but amount of time is spent in thetransmission and verification of user public ...
Lina Zou, Xueying Wang, Lifeng Deng
doaj   +1 more source

Home - About - Disclaimer - Privacy