Ahene et al., 2019 - Google Patents
A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart gridAhene et al., 2019
- Document ID
- 18442471987531998323
- Author
- Ahene E
- Dai J
- Feng H
- Li F
- Publication year
- Publication venue
- Telecommunication Systems
External Links
Snippet
Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front- end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for …
- 230000003044 adaptive 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lu et al. | Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT | |
Yu et al. | LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT | |
Li et al. | Certificateless online/offline signcryption for the Internet of Things | |
Deng et al. | Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records | |
Das et al. | MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure | |
Elhabob et al. | An efficient certificateless public key cryptography with authorized equality test in IIoT | |
Li et al. | Practical signcryption for secure communication of wireless sensor networks | |
Ahene et al. | Efficient signcryption with proxy re-encryption and its application in smart grid | |
Nguyen et al. | Securely outsourcing the ciphertext-policy attribute-based encryption | |
Nasiraee et al. | Privacy-preserving distributed data access control for CloudIoT | |
Zhang et al. | Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure | |
Ahene et al. | A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid | |
Zhang et al. | An efficient certificateless generalized signcryption scheme | |
Hu et al. | DABKS: Dynamic attribute-based keyword search in cloud computing | |
Aroosa et al. | Securing NDN‐Based Internet of Health Things through Cost‐Effective Signcryption Scheme | |
Darzi et al. | LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid | |
Zhang et al. | Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems | |
Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
Xu et al. | A shareable keyword search over encrypted data in cloud computing | |
Wu et al. | Privacy-preserving auditing scheme for shared data in public clouds | |
Elhabob et al. | PKE-ET-HS: Public key encryption with equality test for heterogeneous systems in IoT | |
Hundera et al. | Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city | |
Qin et al. | Simultaneous authentication and secrecy in identity-based data upload to cloud | |
Mythili et al. | An attribute-based lightweight cloud data access control using hypergraph structure | |
Ming et al. | Proxy signcryption scheme in the standard model |