2023
DOI: 10.1016/j.csi.2023.103735
|View full text |Cite
|
Sign up to set email alerts
|

A secure and efficient certificateless authenticated key agreement protocol for smart healthcare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…To solve this problem, Zhang et al [14] proposed a secure revocable data-sharing framework for IoT. The scheme realizes secure data sharing while applying the KUNode algorithm [15] to achieve attribute revocation for malicious users and protect the data owner's privacy. Li et al [16] proposed the subset coverage attribute revocation technique to solve the grid data privacy leakage problem during data privileges revocation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To solve this problem, Zhang et al [14] proposed a secure revocable data-sharing framework for IoT. The scheme realizes secure data sharing while applying the KUNode algorithm [15] to achieve attribute revocation for malicious users and protect the data owner's privacy. Li et al [16] proposed the subset coverage attribute revocation technique to solve the grid data privacy leakage problem during data privileges revocation.…”
Section: Related Workmentioning
confidence: 99%
“…Achieve efficient data access and attribute revocation. The implementation of the scheme [14][15][16][17][18][19][20] attribute revocation all depend on the credibility of the server. Some scholars have proposed puncture encryption techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Authors have proposed an improved certificateless authentication key agreement (CL-AKA) protocol based on the hash function and XOR operation. By analyzing the shortcomings of existing protocols and considering the needs of medical staff and patients, the proposed protocol ensures security and has high efficiency and applicability [78]. An authenticated key agreement protocol based on cross-server for DNA-based U healthcare services has been presented in the IoT.…”
Section: Internet Of Medical Things (Iomt)mentioning
confidence: 99%
“…Their scheme is secure in the eCK model and the standard model. Recently, Ma et al introduced a certificateless AKA scheme for MioT 38 . They also proved the security of their scheme under the CDH assumption.…”
Section: Related Workmentioning
confidence: 99%