4.6 Article

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems

Jianghong Wei et al.

Summary: The wide use of internet-connected services leads to the collection of massive personal data without our consent by service providers. This poses serious risks to individual privacy, particularly when data breaches have become common. To address this, regulations such as the EU's general data protection regulation have been introduced, focusing on giving control of personal data back to owners and the right to be forgotten. In this article, a cryptographic solution called forward-secure attribute-based puncturable encryption (FS-DABPE) is presented for achieving these requirements in outsourced storage. A concrete FS-DABPE construction is provided and its security is proven, along with a prototype implementation and extensive experimental results showcasing its feasibility and practicability.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Computer Science, Information Systems

Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing

Peng Li et al.

Summary: We introduce a new concept of accountable attribute-based authentication with fine-grained access control (AccABA), which provides fine-grained access control, anonymity, and public accountability. We also propose a crowdsourcing scheme on blockchain that is attribute-based, fair, anonymous, and publicly traceable, aiming to filter qualified workers, ensure fair competition, and balance anonymity and accountability.

FRONTIERS OF COMPUTER SCIENCE (2023)

Article Computer Science, Hardware & Architecture

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health

Huiyong Wang et al.

Summary: In this article, a CP-ABE solution with policy-hiding and cloud auditing support is presented to ensure privacy security and data integrity in smart health. It features low decryption costs and efficient performance.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Information Systems

An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things

Zirui Qiao et al.

Summary: This article discusses the certificate-based aggregate signature (CBAS) scheme in the Industrial Internet of Things (IIoT) and proposes a specific construction method that improves the security and privacy of data. The article points out the vulnerabilities in previous schemes and presents forgery attacks against existing constructions. The proposed scheme enhances security through an improved construction based on the hardness of the discrete logarithm problem, proving its security in a random oracle model with efficiency in computation and communication.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Information Systems

Towards secure asynchronous messaging with forward secrecy and mutual authentication

Jianghong Wei et al.

Summary: This paper focuses on zero round-trip time (0-RTT) key exchange protocols and introduces a new cryptographic primitive called puncturable identity-based matchmaking key encapsulation mechanism (PIB-MKEM). Based on PIB-MKEM, a generic 0-RTT key exchange protocol with forward secrecy, mutual authentication, and replay resistance is proposed. The implementation of PIB-MKEM is also provided with extensive evaluations.

INFORMATION SCIENCES (2023)

Article Computer Science, Hardware & Architecture

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption

Yanwei Zhou et al.

Summary: This paper presents a continuous leakage resilient semantically secure Identity-based Encryption (IBE) scheme based on the dual system encryption technique. The scheme achieves security against chosen-ciphertext attacks (CCA) with static assumptions and allows leakage of multiple keys. It also demonstrates better computational performance.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Hardware & Architecture

Full black-box retrievable and accountable identity-based encryption

Zhen Zhao et al.

Summary: Accountable identity-based encryption (A-IBE) was proposed to address the key escrow problem in the IBE system. Retrievable A-IBE (RA-IBE) enhances the security by providing retrievability to the master secret key. However, current RA-IBE schemes lack the ability to support traceability and retrievability on well-formed private keys only.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Information Systems

Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services

Victor Sucasas et al.

Summary: Attribute-based authentication is important for fine-grained access control in cloud-based services, but it raises privacy concerns. Privacy Attribute-Based Credentials (Privacy-ABCs) support pseudonym-based authentication while hiding user identity. However, they require selective disclosure of attribute values. Our proposed pseudonym-based signature scheme combines the benefits of Privacy-ABCs, Attribute-Based Signatures (ABS), and mesh signatures to enable unlinkable pseudonym self-generation with embedded attributes and verifiable attribute delegation.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Hardware & Architecture

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing

Haiyan Wang et al.

Summary: This paper proposes a new searchable algorithm based on LSSS access policy, which outperforms previous work in computational and storage efficiency. By utilizing 0,1-coding theory to optimize the search mechanism and improve range search, the scheme achieves significant improvement in both computational and storage efficiency, as evaluated through theoretical analysis and experimental simulation.

COMPUTER STANDARDS & INTERFACES (2022)

Article Computer Science, Information Systems

Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments

Zirui Qiao et al.

Summary: The article identifies security flaws in a certificate public key signature scheme for mobile payments, proposing a concrete construction with improved security, and introducing a secure transaction scheme based on the improved scheme.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing

Xiaoying Jia et al.

Summary: This article focuses on the security and privacy issues in mobile-edge computing (MEC) deployment and revisits an anonymous authentication scheme. It highlights the vulnerabilities in the scheme and presents a redesigned protocol using password and biometrics for authentication. Performance comparison shows that our scheme outperforms competing schemes in terms of computation and communication costs.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function

Salman Shamshad et al.

Summary: The study presents an extended authentication scheme for the multi-server infrastructure in the TMIS, utilizing a physically unclonable function to address privacy and security concerns. Through security evaluation and performance analysis, the proposed scheme effectively counters various security threats in modern TMIS protocols with lower computational complexity.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things

Zirui Qiao et al.

Summary: This article focuses on the security of certificate-based proxy signature (CBPS) schemes in the industrial Internet of things (IIoT). It identifies previous proposals' security issues and design flaws and presents three new constructions with improved security. The article provides formal security proofs using forking lemma in the random oracle and discusses the two necessary conditions for constructing secure CBPS schemes.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things

Zhishuo Zhang et al.

Summary: This paper proposes an IND-CCA-secure multi-authority ciphertext-policy ABE scheme for access control and admission detection in the distributed IoT environment, using zero knowledge proof and random authentication messages to protect user privacy. The theoretical analysis and performance evaluation demonstrate the efficiency and applicability of the scheme in distributed IoT-assisted cloud computing.

COMPUTER NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging

Jianghong Wei et al.

Summary: Efforts have been made to develop a new encryption method, called forward-secure puncturable encryption (FSPE), to achieve fine-grained forward security for asynchronous messaging systems. Users can maintain the decryption capacity for encrypted messages that have not been received yet, even if the secret key is exposed.

IEEE-ACM TRANSACTIONS ON NETWORKING (2021)

Article Computer Science, Theory & Methods

Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing

Yanwei Zhou et al.

Summary: This paper proposes a continuous leakage-resilient certificate-based signcryption (CBS) scheme, which is proven to achieve chosen-ciphertext attacks (CCA) security with low computational overheads. Based on the discrete logarithm assumption and the decisional Diffie-Hellman assumption, the scheme can resist continuous leakage attacks and is suitable for data storage and authorization in cloud computing systems.

THEORETICAL COMPUTER SCIENCE (2021)

Article Computer Science, Theory & Methods

Novel generic construction of leakage-resilient PKE scheme with CCA security

Yanwei Zhou et al.

Summary: The leakage of private state information through various attacks poses a serious threat to computer systems, and there is a common requirement for cryptographic schemes to withstand these attacks. However, existing leakage-resilient public-key encryption schemes have high computational costs and fixed leakage upper bounds. To address these issues, a generic method for designing leakage-amplified PKE schemes with leakage resilience and CCA security is proposed, allowing flexible adjustment of leakage parameters. This method introduces a new cryptographic primitive and utilizes generic constructions to enhance security.

DESIGNS CODES AND CRYPTOGRAPHY (2021)

Article Computer Science, Information Systems

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing

Xiaoying Jia et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking

Xianwei Zhu et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Engineering, Electrical & Electronic

Securing communication by attribute-based authentication in HetNet used for medical applications

Tufail A. Lone et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2020)

Article Computer Science, Information Systems

A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System

Chun-Ta Li et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Revocable Attribute-Based Signature for Blockchain-Based Healthcare System

Qianqian Su et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication

Kostantinos Papadamou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Blockchain-Based Secure Storage and Access Scheme For Electronic Medical Records in IPFS

Jin Sun et al.

IEEE ACCESS (2020)

Article Computer Science, Hardware & Architecture

An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks

Hui Cui et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2019)

Article Computer Science, Hardware & Architecture

Attribute-based authentication on the cloud for thin clients

Maged Hamada Ibrahim et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Information Systems

Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks

Yongbin Zeng et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Revocable attribute-based access control in mutli-autority systems

Youcef Imine et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Editorial Material Education, Scientific Disciplines

Commentary: The RIME/EMR Scheme: An Educational Approach to Clinical Documentation in Electronic Medical Records

Mark B. Stephens et al.

ACADEMIC MEDICINE (2011)