[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bera et al., 2020 - Google Patents

Designing blockchain-based access control protocol in IoT-enabled smart-grid system

Bera et al., 2020

View PDF
Document ID
15646455350112871005
Author
Bera B
Saha S
Das A
Vasilakos A
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

We design a new blockchain-based access control protocol in IoT-enabled smart-grid system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely brought to the service providers from their respective smart meters (SMs). The peer-to-peer …
Continue reading at drive.google.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Similar Documents

Publication Publication Date Title
Bera et al. Designing blockchain-based access control protocol in IoT-enabled smart-grid system
Vangala et al. Smart contract-based blockchain-envisioned authentication scheme for smart farming
Srinivas et al. Designing anonymous signature-based authenticated key exchange scheme for Internet of Things-enabled smart grid systems
Wazid et al. Design of secure key management and user authentication scheme for fog computing services
Khan et al. LAKAF: Lightweight authentication and key agreement framework for smart grid network
Malani et al. Certificate-based anonymous device access control scheme for IoT environment
Abdi Nasib Far et al. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
US11212081B2 (en) Method for signing a new block in a decentralized blockchain consensus network
CN114499895B (en) Data trusted processing method and system fusing trusted computing and block chain
Shao et al. Attrichain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain
Das et al. AI-envisioned blockchain-enabled signature-based key management scheme for industrial cyber–physical systems
Chang et al. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
Yu et al. ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Mao et al. BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems
Thakur et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Sharma et al. A blockchain based secure communication framework for community interaction
Vangala et al. Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home.
CN107104804A (en) A kind of platform integrity verification method and device
Deng et al. Certificateless provable data possession scheme with provable security in the standard model suitable for cloud storage
Xu et al. A decentralized lightweight authentication protocol under blockchain
Li et al. Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts
Shahidinejad et al. Anonymous Lattice-Based Authentication Protocol for Vehicular Communications
Lyu et al. JRS: A joint regulating scheme for secretly shared content based on blockchain
Nkurunziza et al. ECAAP‐SG: Efficient certificateless anonymous authentication protocol for SG