4.6 Article

Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things

Hang Li et al.

Summary: The Internet of Health Things (IoHT) refers to uniquely identifiable devices connected to the Internet that can communicate with each other. This concept plays a crucial role in smart health monitoring and improvement systems, with cybersecurity being a top priority. This article proposes a novel access policy expression method and constructs a flexible and efficient encryption scheme to ensure data security in the IoHT.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Computer Science, Information Systems

EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem

Fengqi Li et al.

Summary: This paper proposes a blockchain-based EHR system to solve the problems of secure storage, reliable sharing, access control, and privacy protection in the medical industry. The system achieves high performance by designing a medical record storage scheme, improving cryptographic primitives, and applying an additive homomorphic cryptosystem.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain

Chunhui Wu et al.

Summary: Blockchain technologies are attracting attention due to their immutability, but there is a desire to edit transactions or blocks in a controlled way. Chameleon hash functions with enhanced collision resistance are important tools for constructing editable blockchains, while traditional double-trapdoor constructions are unsuitable. Single-trapdoor chameleon hash functions with enhanced collision resistance are rare, and this paper proposes two such functions based on lattice for redactable blockchains.

INFORMATION SCIENCES (2021)

Article Business

An Optimized Consortium Blockchain for Medical Information Sharing

Mingxiao Du et al.

Summary: This article discusses the challenges and solutions for medical information sharing, proposing a new business process and platform based on blockchain technology. By introducing a new consensus algorithm and an anonymous sharing model, the efficiency and security of medical information sharing are improved.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2021)

Article Computer Science, Information Systems

MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange

Alaa Awad Abdellatif et al.

Summary: This article proposes a medical-edge-blockchain framework (MEdge-Chain) that utilizes edge computing and blockchain technologies to secure and efficiently exchange and store medical data. The framework includes an automated patient monitoring scheme and a blockchain-based optimization model for enhancing medical data exchange between different entities.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain Mutability: Challenges and Proposed Solutions

Eugenia Politou et al.

Summary: Blockchain has evolved rapidly over the past decade, with its immutability being questioned in light of the EU's GDPR Right to be Forgotten provision, posing a challenge for compliance while maintaining security. Various methods and techniques for mutable blockchains have been proposed to address this contradiction.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Automation & Control Systems

Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System

Mamta et al.

Summary: The concept of sharing personal health data through cloud storage in healthcare-cyber physical systems has gained popularity by improving access quality. While attribute-based searchable encryption (ABSE) provides fine-grained searching capabilities in shared cloud storage, it is not practical for devices with limited resources. The proposed scheme manages computational costs by executing intensive tasks on the blockchain network, offering decentralization and efficiency benefits.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Article Computer Science, Theory & Methods

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

Mande Xie et al.

Summary: With the rapid development of cloud computing, attribute-based encryption (ABE) has attracted widespread attentions due to its unique attribute matching mechanism, while mobile devices have put forward higher requirements for ABE schemes. In this paper, an original hybrid cloud multi-authority ciphertext-policy attribute-based encryption (HCMACP-ABE) scheme is proposed, utilizing the LSSS access structure for secure access control and the private cloud for maintaining user authorization lists and verifying users. The proposal achieves IND-CCA secure and is efficient in a mobile hybrid cloud environment.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Article Computer Science, Information Systems

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing

Jiguo Li et al.

Summary: In this paper, an efficient extended file hierarchy CP-ABE scheme (EFH-CP-ABE) is proposed to encrypt multiple files on the same access level for secure cloud storage. This scheme is practical and beneficial for big institutions or companies that have many hierarchical sectors.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Information Systems

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices

Hui Ma et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Efficient chameleon hash functions in the enhanced collision resistant model

Mojtaba Khalili et al.

INFORMATION SCIENCES (2020)

Article Engineering, Electrical & Electronic

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain

Sheng Gao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Proceedings Paper Computer Science, Information Systems

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability

Yangguang Tian et al.

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)

Article Automation & Control Systems

Building Redactable Consortium Blockchain for Industrial Internet-of-Things

Ke Huang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Proceedings Paper Computer Science, Theory & Methods

Redactable Blockchain in the Permissionless Setting

Dominic Deuber et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

Redactable Blockchain using Enhanced Chameleon Hash Function

Kondapally Ashritha et al.

2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS) (2019)

Editorial Material Computer Science, Information Systems

Cryptocurrencies-A Forensic Challenge or Opportunity for Law Enforcement? An INTERPOL Perspective

Giannis Tziakouris

IEEE SECURITY & PRIVACY (2018)

Proceedings Paper Computer Science, Information Systems

FAME: Fast Attribute-based Message Encryption

Shashank Agrawal et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Hardware & Architecture

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Yogachandran Rahulamathavan et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Fuzzy Signatures: Relaxing Requirements and a New Construction

Takahiro Matsuda et al.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016 (2016)

Proceedings Paper Computer Science, Information Systems

The Bitcoin Backbone Protocol: Analysis and Applications

Juan Garay et al.

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)

Article Computer Science, Theory & Methods

Charm: a framework for rapidly prototyping cryptosystems

Joseph A. Akinyele et al.

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (2013)

Article Computer Science, Theory & Methods

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Mathematics, Applied

A new provably secure certificateless short signature scheme

Kyu Young Choi et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)