Sun et al., 2021 - Google Patents
A secure and computable blockchain-based data sharing scheme in IoT systemSun et al., 2021
View HTML- Document ID
- 12948261155364539756
- Author
- Sun S
- Du R
- Chen S
- Publication year
- Publication venue
- Information
External Links
Snippet
The internet of things (IoT) devices are expected to collect vast amounts of data that support different kinds of applications such as health monitor, smart home, and traffic management. However, its characteristics such as resource-constrained nature, dynamicity, and large …
- 238000000034 method 0 abstract description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3244—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials for message authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Park et al. | Privacy-preserving federated learning using homomorphic encryption | |
Obour Agyekum et al. | A secured proxy-based data sharing module in IoT environments using blockchain | |
Chinnasamy et al. | Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system | |
Nyame et al. | An ECDSA approach to access control in knowledge management systems using blockchain | |
Cheng et al. | An efficient ECC-based CP-ABE scheme for power IoT | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Zhu et al. | Secure and privacy-preserving body sensor data collection and query scheme | |
Luo et al. | Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage | |
Jiang et al. | EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks | |
Yin et al. | A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data | |
Thanalakshmi et al. | A quantum-resistant blockchain system: a comparative analysis | |
Sun et al. | A secure and computable blockchain-based data sharing scheme in IoT system | |
Yang et al. | Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage | |
Mesnager et al. | Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain | |
Cui et al. | A certificateless authenticated key agreement scheme for the power IoT | |
Kallapu et al. | Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption | |
Lee et al. | A secure key aggregate searchable encryption with multi delegation in cloud data sharing service | |
Zhai et al. | Privacy-preserving outsourcing algorithms for multidimensional data encryption in smart grids | |
Liao et al. | Analysis of an ABE scheme with verifiable outsourced decryption | |
Chen et al. | Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain | |
Yuan et al. | Privacy-protection scheme of a credit-investigation system based on blockchain | |
Wu et al. | Quantum secure multi-party summation using single photons | |
Hu et al. | Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain | |
Fan et al. | Cloud-assisted private set intersection via multi-key fully homomorphic encryption | |
Chandel et al. | RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment |