[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Guo et al., 2019 - Google Patents

Efficient hierarchical identity-based encryption system for internet of things infrastructure

Guo et al., 2019

View HTML
Document ID
9225884206108909686
Author
Guo L
Wang J
Yau W
Publication year
Publication venue
Symmetry

External Links

Snippet

Security is a main concern for the Internet of Things (IoT) infrastructure as large volumes of data are collected and processed in the systems. Due to the limited resources of interconnected sensors and devices in the IoT systems, efficiency is one of the key …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications

Similar Documents

Publication Publication Date Title
Fan et al. Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain
Wu et al. Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing
Zhou et al. Public key encryption with keyword search in cloud: a survey
Luo et al. Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage
Ming et al. Identity-based encryption with filtered equality test for smart city applications
Fan et al. Anonymous multi-receiver identity-based authenticated encryption with CCA security
Li et al. A novel lattice-based CP-ABPRE scheme for cloud sharing
Jiao et al. A computation-efficient group key distribution protocol based on a new secret sharing scheme
Guo et al. Efficient hierarchical identity-based encryption system for internet of things infrastructure
Jemihin et al. Attribute-based encryption in securing big data from post-quantum perspective: a survey
Shah et al. Enhancing security and efficiency in underwater wireless sensor networks: a lightweight key management framework
Chen et al. An identity-based cross-domain authenticated asymmetric group key agreement
Sun et al. A secure and computable blockchain-based data sharing scheme in IoT system
Lin et al. Identity-based proxy re-encryption scheme using fog computing and anonymous key generation
Xie et al. Privacy-preserving location-based service scheme for mobile sensing data
Zhang et al. Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication
Cai et al. Two-party privacy-preserving set intersection with FHE
Ren et al. Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud
Meshram et al. A provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under human-centered IoT environments
Zhang et al. Adaptively secure efficient (H) IBE over ideal lattice with short parameters
Li Efficient equality test on identity-based ciphertexts supporting flexible authorization
Antony et al. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology
Zheng et al. A secure data-sharing scheme for privacy-preserving supporting node–edge–cloud collaborative computation
Yao et al. A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis
Feng et al. A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme