[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sun et al., 2021 - Google Patents

A secure and computable blockchain-based data sharing scheme in IoT system

Sun et al., 2021

View HTML
Document ID
12948261155364539756
Author
Sun S
Du R
Chen S
Publication year
Publication venue
Information

External Links

Snippet

The internet of things (IoT) devices are expected to collect vast amounts of data that support different kinds of applications such as health monitor, smart home, and traffic management. However, its characteristics such as resource-constrained nature, dynamicity, and large …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3244Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials for message authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Similar Documents

Publication Publication Date Title
Park et al. Privacy-preserving federated learning using homomorphic encryption
Obour Agyekum et al. A secured proxy-based data sharing module in IoT environments using blockchain
Chinnasamy et al. Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system
Nyame et al. An ECDSA approach to access control in knowledge management systems using blockchain
Cheng et al. An efficient ECC-based CP-ABE scheme for power IoT
Wu et al. Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing
Zhu et al. Secure and privacy-preserving body sensor data collection and query scheme
Luo et al. Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage
Jiang et al. EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks
Yin et al. A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data
Thanalakshmi et al. A quantum-resistant blockchain system: a comparative analysis
Sun et al. A secure and computable blockchain-based data sharing scheme in IoT system
Yang et al. Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage
Mesnager et al. Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain
Cui et al. A certificateless authenticated key agreement scheme for the power IoT
Kallapu et al. Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption
Lee et al. A secure key aggregate searchable encryption with multi delegation in cloud data sharing service
Zhai et al. Privacy-preserving outsourcing algorithms for multidimensional data encryption in smart grids
Liao et al. Analysis of an ABE scheme with verifiable outsourced decryption
Chen et al. Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
Yuan et al. Privacy-protection scheme of a credit-investigation system based on blockchain
Wu et al. Quantum secure multi-party summation using single photons
Hu et al. Privacy-Preserving Medical Data-Sharing System with Symmetric Encryption Based on Blockchain
Fan et al. Cloud-assisted private set intersection via multi-key fully homomorphic encryption
Chandel et al. RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment