Sanchol et al., 2023 - Google Patents
A fully outsourced attribute-based signcryption scheme supporting privacy-preserving policy update in mobile cloud computingSanchol et al., 2023
View PDF- Document ID
- 8047996501041444771
- Author
- Sanchol P
- Fugkeaw S
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Existing fine-grained and secure access control systems deployed in mobile cloud computing (MCC) typically focus on offloading encryption and/or decryption workloads to the delegated proxy in the cloud server. However, the privacy and authenticity management of …
- 238000000034 method 0 abstract description 57
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure | |
Yu et al. | LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT | |
Belguith et al. | Analysis of attribute‐based cryptographic techniques and their application to protect cloud services | |
Horng et al. | An identity-based and revocable data-sharing scheme in VANETs | |
Das et al. | MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure | |
Zhang et al. | Enabling efficient data sharing with auditable user revocation for IoV systems | |
Deng et al. | Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records | |
Wang et al. | Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage | |
Sun et al. | Non-repudiation storage and access control scheme of insurance data based on blockchain in IPFS | |
CN114039790A (en) | Block chain-based fine-grained cloud storage security access control method | |
CN113434875B (en) | A lightweight access method and system based on blockchain | |
Nasiraee et al. | Privacy-preserving distributed data access control for CloudIoT | |
Sanchol et al. | A fully outsourced attribute-based signcryption scheme supporting privacy-preserving policy update in mobile cloud computing | |
Susilo et al. | EACSIP: Extendable access control system with integrity protection for enhancing collaboration in the cloud | |
Zhang et al. | Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems | |
Li et al. | Traceable Ciphertext‐Policy Attribute‐Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud | |
Liang et al. | An access control scheme with privacy-preserving authentication and flexible revocation for smart healthcare | |
Deng et al. | Revocable cloud-assisted attribute-based signcryption in personal health system | |
Kibiwott et al. | Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing | |
Sandhia et al. | Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography | |
He et al. | A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing | |
Rao | Attribute‐based online/offline signcryption scheme | |
Zhao et al. | Efficient multi-authority attribute-based signcryption with constant-size ciphertext | |
Cui et al. | An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system | |
Li et al. | Multi-user searchable encryption with a designated server |