[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ren et al., 2022 - Google Patents

Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud

Ren et al., 2022

View HTML
Document ID
3263948587579795408
Author
Ren C
Dong X
Shen J
Cao Z
Zhou Y
Publication year
Publication venue
Applied Sciences

External Links

Snippet

In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one's own preferred order. To achieve this fine-gained access control to …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Fan et al. Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain
Xiao et al. A hybrid scheme for fine-grained search and access authorization in fog computing environment
Wu et al. Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing
Luo et al. Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage
Ming et al. Identity-based encryption with filtered equality test for smart city applications
Yin et al. A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data
Fan et al. Anonymous multi-receiver identity-based authenticated encryption with CCA security
Li et al. A novel lattice-based CP-ABPRE scheme for cloud sharing
Yang et al. Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage
Zhou et al. Privacy-preserving and efficient public key encryption with keyword search based on CP-ABE in cloud
Jemihin et al. Attribute-based encryption in securing big data from post-quantum perspective: a survey
Yang et al. Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme
Wang et al. A lightweight certificateless group key agreement method without pairing based on blockchain for smart grid
Chen et al. An identity-based cross-domain authenticated asymmetric group key agreement
Guo et al. Efficient hierarchical identity-based encryption system for internet of things infrastructure
Shen et al. Identity based generalized signcryption scheme in the standard model
Lin et al. Identity-based proxy re-encryption scheme using fog computing and anonymous key generation
Ren et al. Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud
Zhang et al. Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication
Lin et al. An improved ID-based data storage scheme for fog-enabled IoT environments
Qiao et al. Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage
Kim et al. Secure encapsulation schemes using key recovery system in iomt environments
Chandel et al. RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment
Feng et al. Certificateless searchable encryption scheme in multi-user environment
Chen et al. Dsvn: A flexible and secure data-sharing model for vanet based on blockchain