4.8 Article

A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things

Bei Gong et al.

Summary: By developing a secure and lightweight certificateless hybrid signcryption scheme, it is computationally efficient for protecting the secure communication between nodes with limited resources in the Internet of Things, meeting requirements such as confidentiality, unforgability, semipublic verification, and forward security.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Hardware & Architecture

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks

Jian Shen et al.

Summary: This article proposes a multi-receiver secure data transmission protocol for wireless body area networks (WBANs), supporting multidisciplinary team treatment. The protocol utilizes a novel certificateless generalized signcryption scheme, ensuring various security properties.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

A Privacy-Preserving Cross-Domain Healthcare Wearables Recommendation Algorithm Based on Domain-Dependent and Domain-Independent Feature Fusion

Xu Yu et al.

Summary: This paper proposes a privacy-preserving cross-domain healthcare wearables recommendation algorithm (PPCDHWRec) that improves recommendation performance by leveraging auxiliary domain information and user feature segmentation.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Computer Science, Information Systems

Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices

Jiasheng Chen et al.

Summary: The emergence of edge computing has brought data processing and storage closer to terminal equipment, resulting in a model of edge computing-assisted cloud computing. Protecting user privacy from untrusted entities has become a critical concern in this architecture. Many cryptographic schemes have been proposed to secure the data sharing of IoT devices in the traditional cloud model. However, resource-constrained devices in the IoT hinder the efficiency of schemes, and traditional cryptographic schemes are not suitable for edge computing. To address this issue, an improved certificateless online/offline signcryption (CLOOSC) scheme is proposed, achieving lower computational overhead and secure data sharing between IoT devices.

IEEE INTERNET OF THINGS JOURNAL (2022)

Proceedings Paper Computer Science, Information Systems

Efficient Hash-Based Redactable Signature for Smart Grid Applications

Fei Zhu et al.

Summary: The sharing of energy usage data in smart grids is increasingly popular, and a customer-centric energy usage data management framework has been proposed as an effective solution. However, existing schemes have issues with computational efficiency and vulnerability to quantum attacks. To address these concerns, this work proposes a hash-based RS scheme HRSS, which is the first quantum-safe RS scheme.

COMPUTER SECURITY - ESORICS 2022, PT III (2022)

Article Computer Science, Information Systems

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions

Moustafa Mamdouh et al.

Summary: The Internet of Things (IoT) is a crucial technology in healthcare, increasing efficiency but facing security vulnerabilities. This study focuses on IoT perception layer and offers a comprehensive review of IoHT or IoMT, including device authentication mechanisms and future vision utilizing technologies like AI and blockchain.

COMPUTERS & SECURITY (2021)

Review Computer Science, Hardware & Architecture

A systematic review of IoT in healthcare: Applications, techniques, and trends

Mostafa Haghi Kashani et al.

Summary: Internet of Things (IoT) is an expanding ecosystem integrating software, hardware, physical objects, and computing devices for communication, data collection, and exchange. In healthcare systems, IoT shows potential in reducing strain and providing tailored health services. A systematic review of 146 articles classified existing Healthcare IoT (HIoT) systems, discussed their benefits and limitations, and highlighted future trends and challenges in the field.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

A Pairing-Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks

Du Hongzhen et al.

Summary: Vehicular ad hoc networks (VANETs) provide various services while also posing security risks. Security and privacy are crucial in VANET research. Signcryption is an ideal method for secure message transfer, and our Certificateless signcryption (CLSC) scheme combines efficiency, security, and privacy for secure communication in vehicle networks.

CHINESE JOURNAL OF ELECTRONICS (2021)

Article Computer Science, Information Systems

A Lightweight Data Aggregation Protocol With Privacy-Preserving for Healthcare Wireless Sensor Networks

Bo Zhang

Summary: The article introduces a lightweight data aggregation protocol that enhances security in HWSNs while protecting privacy. The protocol efficiently aggregates patients' personal health data, allowing medical service providers to access information in a secure manner.

IEEE SYSTEMS JOURNAL (2021)

Review Computer Science, Information Systems

Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security

Ali Ghubaish et al.

Summary: The advancements in Internet of Things (IoT) technologies have transformed the healthcare industry through remote patient monitoring, enhancing patient care efficiency. Yet, the security of these systems remains a major challenge, requiring robust measures to safeguard data.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0

Han Qiu et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2020)

Article Engineering, Electrical & Electronic

P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications

Muhammad Usman et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices

Arijit Karati et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Automation & Control Systems

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments

Arijit Karati et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Editorial Material Computer Science, Theory & Methods

Comments on Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems

Caixue Zhou

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A pairing-free and provably secure certificateless signature scheme

Arijit Karati et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Hardware & Architecture

Pairing-Free and Secure Certificateless Signcryption Scheme

Huifang Yu et al.

COMPUTER JOURNAL (2017)

Article Multidisciplinary Sciences

Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System

S. K. Hafizul Islam et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)

Article Computer Science, Information Systems

On security of a certificateless signcryption scheme

Songqin Miao et al.

INFORMATION SCIENCES (2013)

Article Mathematics, Applied

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography

S. K. Hafizul Islam et al.

INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS (2013)

Article Computer Science, Information Systems

Certificateless signcryption scheme in the standard model

Zhenhua Liu et al.

INFORMATION SCIENCES (2010)