Hu et al., 2022 - Google Patents
Lattice based ring signature scheme for secure cloud-based EMR sharingHu et al., 2022
- Document ID
- 12359069600890118131
- Author
- Hu W
- Chai Y
- Chen X
- Zheng C
- Publication year
- Publication venue
- 2022 7th International Conference on Computer and Communication Systems (ICCCS)
External Links
Snippet
Advances in medical science and technology continue to drive the development of e- healthcare, with Electronic Medical Records (EMRs) consisting of medical information such as patient consultation records and bodily data being gradually popularized in the form of …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sahoo et al. | A secure three factor based authentication scheme for health care systems using IoT enabled devices | |
| Namasudra et al. | Security, privacy, trust, and anonymity | |
| Wenhua et al. | A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications | |
| WO2004061786A2 (en) | Methods and apparatus for credential validation | |
| Wu et al. | Blockchain-based anonymous data sharing with accountability for Internet of Things | |
| Tun et al. | Secure PUF-based authentication systems | |
| Ali et al. | Anonymous aggregate fine-grained cloud data verification system for smart health | |
| Wu et al. | Privacy-preserving cancelable biometric authentication based on RDM and ECC | |
| Shanmugam et al. | Privacy-preserving ai/ml application architectures: Techniques, trade-offs, and case studies | |
| Xu et al. | Privacy-preserving and efficient truly three-factor authentication scheme for telecare medical information systems | |
| Meshram et al. | An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric: C. Meshram et al. | |
| Wu et al. | A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof | |
| Al-karkhi et al. | A secure private key recovery based on DNA bio-cryptography for Blockchain | |
| Zhu et al. | Revocable-hierarchical-identity-based inner product function encryption in smart healthcare | |
| Yang et al. | Reflecting attack and improvement of a semi-quantum private comparison protocol with three-particle GHZ-like states | |
| Sarkar et al. | A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function | |
| Kaul et al. | Secure and privacy preserving biometric based user authentication with data access control system in the healthcare environment | |
| Venkatesh et al. | Enhancing healthcare security with quantum blockchain: Electronic medical records protection | |
| Hu et al. | Lattice based ring signature scheme for secure cloud-based EMR sharing | |
| Li et al. | An Efficient and Provably‐Secure Certificateless Proxy‐Signcryption Scheme for Electronic Prescription System | |
| Sourav et al. | Post-quantum secure health records: a blockchain-based lattice threshold signcryption scheme | |
| Lei et al. | A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems | |
| Kaur et al. | Lightweight cipher algorithms for smart cards security: A survey and open challenges | |
| Ashor et al. | Enhanced security of Iraqi national card based on blockchain technique | |
| He et al. | A post-quantum blockchain and autonomous AI-enabled scheme for secure healthcare information exchange |