2018
DOI: 10.1504/ijsnet.2018.088384
|View full text |Cite
|
Sign up to set email alerts
|

A traceable threshold attribute-based signcryption for mHealthcare social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(29 citation statements)
references
References 0 publications
0
29
0
Order By: Relevance
“…Also, it does not support mutual authentication, forward secrecy, public verifiability, and protection against replay attack. Lu et al [12] proposed a scheme for a social network-based mobile health care system that uses attribute-based signcryption. They used a fourparty model to protect patients' sensitive information.…”
Section: Related Work On Signcryption For Wbanmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, it does not support mutual authentication, forward secrecy, public verifiability, and protection against replay attack. Lu et al [12] proposed a scheme for a social network-based mobile health care system that uses attribute-based signcryption. They used a fourparty model to protect patients' sensitive information.…”
Section: Related Work On Signcryption For Wbanmentioning
confidence: 99%
“…In Table 2, we summarize the contributed schemes on the basis of public key cryptosystems that are attribute based, PKI based, certificateless, certificate based, and heterogeneous, respectively. The schemes in [7,8,12,19] realized on the concept of attribute-based signcryption, while schemes in [7,8,12] at the same time utilizes the concept…”
Section: Classification Of Signcryption Schemes For Wbanmentioning
confidence: 99%
“…The common approach to ensure security is via preventative countermeasures, such as, access control and intrusion detection that attempt to prevent secure policy violations from security attacks [1]. Another approach is via accountability [1]- [8] -an after-the-fact examination of system activities to discern whether a violation of a security policy has occurred, and what has caused or what chain of events has led to the policy violation [1], [2], [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…For example, more than 400, 000 electronic eyes in Beijing may lead to privacy leakage (e.g., vehicle location information) by data sharing in vehicular ad hoc networks (VANETs) [6][7][8]. Similarly, we can also gain illegal access to personal health datasets gathered from various sensors of physical sign in body sensor networks (BSNs) and publish these private data without permission [9][10][11]. As a result, how to protect user privacy is one of the important research issues in fog computing.…”
Section: Introductionmentioning
confidence: 99%
“…The first one is designed based on various encryption technologies, such as homomorphic encryption [6,[8][9][10]. In this type, the encryption technology may cause huge computational overhead as well as lots of computing resources of cloud services [12].…”
Section: Introductionmentioning
confidence: 99%