Ren et al., 2022 - Google Patents
Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloudRen et al., 2022
View HTML- Document ID
- 3263948587579795408
- Author
- Ren C
- Dong X
- Shen J
- Cao Z
- Zhou Y
- Publication year
- Publication venue
- Applied Sciences
External Links
Snippet
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one's own preferred order. To achieve this fine-gained access control to …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fan et al. | Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain | |
Xiao et al. | A hybrid scheme for fine-grained search and access authorization in fog computing environment | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Luo et al. | Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage | |
Ming et al. | Identity-based encryption with filtered equality test for smart city applications | |
Yin et al. | A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data | |
Fan et al. | Anonymous multi-receiver identity-based authenticated encryption with CCA security | |
Li et al. | A novel lattice-based CP-ABPRE scheme for cloud sharing | |
Yang et al. | Certificateless provable group shared data possession with comprehensive privacy preservation for cloud storage | |
Zhou et al. | Privacy-preserving and efficient public key encryption with keyword search based on CP-ABE in cloud | |
Jemihin et al. | Attribute-based encryption in securing big data from post-quantum perspective: a survey | |
Yang et al. | Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme | |
Wang et al. | A lightweight certificateless group key agreement method without pairing based on blockchain for smart grid | |
Chen et al. | An identity-based cross-domain authenticated asymmetric group key agreement | |
Guo et al. | Efficient hierarchical identity-based encryption system for internet of things infrastructure | |
Shen et al. | Identity based generalized signcryption scheme in the standard model | |
Lin et al. | Identity-based proxy re-encryption scheme using fog computing and anonymous key generation | |
Ren et al. | Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud | |
Zhang et al. | Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication | |
Lin et al. | An improved ID-based data storage scheme for fog-enabled IoT environments | |
Qiao et al. | Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage | |
Kim et al. | Secure encapsulation schemes using key recovery system in iomt environments | |
Chandel et al. | RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment | |
Feng et al. | Certificateless searchable encryption scheme in multi-user environment | |
Chen et al. | Dsvn: A flexible and secure data-sharing model for vanet based on blockchain |