2017
DOI: 10.1007/s11276-017-1597-8
|View full text |Cite
|
Sign up to set email alerts
|

A combined public-key scheme in the case of attribute-based for wireless body area networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…Table 1 summarises methods for certificateless, certificated, and heterogeneous public key cryptosystems. Attribute-based signcryption is used in all of the processes in [7,8] making use of public key infrastructure-(PKI-) based cryptography. Certificateless signcryption was utilised in [9,10]; signcryption is heterogeneous and not certificate-based.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Table 1 summarises methods for certificateless, certificated, and heterogeneous public key cryptosystems. Attribute-based signcryption is used in all of the processes in [7,8] making use of public key infrastructure-(PKI-) based cryptography. Certificateless signcryption was utilised in [9,10]; signcryption is heterogeneous and not certificate-based.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authentication has typically been approached either using known cryptographic algorithms (e.g., public key cryptography, identity-based encryption) or by custom solutions that are generally based on key management and hashing. Elliptic curve-based signatures are used in [15], [33], [34], [38] to authenticate data in Layer 1, and authentication relying on identity-based encryption (IBE) signatures is studied in [13], [41] to authenticate the sensor nodes and a cloud server. Both of these studies present results from simulations only and for an outdated security level (80 bits) in the first study.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically, most existing research regarding secure WBANs primarily investigated the design of lightweight security services for data collection (e.g., those produced in the sensor nodes and delivered to a base station) [8], [9], [10]. Other studies reported custom security protocols that address some but not all of the required security services [11]- [14], or practical deployments with experimental evaluation of security mechanisms are missing [15]- [17]. It is worth noting that custom protocols usually only address one single security service, and only for two actors in the WBAN (sensor node and base station, or sensor node and cloud server).…”
Section: Introductionmentioning
confidence: 99%
“…CPK is a public key system based on the combination, which combines key production and key management, and can meet the requirements of identification authentication [23]. A CPK cryptosystem is based on the user identification information.…”
Section: Combined Public Key Algorithmmentioning
confidence: 99%