2022 IEEE Wireless Communications and Networking Conference (WCNC) 2022
DOI: 10.1109/wcnc51071.2022.9771830
|View full text |Cite
|
Sign up to set email alerts
|

AQ–ABS: Anti-Quantum Attribute-based Signature for EMRs Sharing with Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…In 2008, Satoshi Nakamoto proposed the concept of blockchain [13] , [31] , which is a distributed database managed autonomously through peer-to-peer Network and distributed servers. In blockchain, all data are decentralized stored in all nodes involved in recording data and maintained by all participants rather than stored centrally in the central node, which is a secure, unforgeable, and trustworthy distributed database.…”
Section: Preliminariesmentioning
confidence: 99%
“…In 2008, Satoshi Nakamoto proposed the concept of blockchain [13] , [31] , which is a distributed database managed autonomously through peer-to-peer Network and distributed servers. In blockchain, all data are decentralized stored in all nodes involved in recording data and maintained by all participants rather than stored centrally in the central node, which is a secure, unforgeable, and trustworthy distributed database.…”
Section: Preliminariesmentioning
confidence: 99%
“…An architecture that takes into account both onchain and off-chain performance High scalability; low workload; low cost; prevents network abuse requires mining AQ-ABS [71] Designed a signature based on anti-quantum properties…”
Section: Tppsup-ply [70]mentioning
confidence: 99%
“…Information security blockchains are generally secure owing to asymmetric cryptography. However, as more attacks are developed, researchers have become interested in the ability of blocks to withstand attacks [43,44,46,52,55,56,61,71,72,77], such as inference attacks, poisoning attacks, DoS Hulk attacks, DDoS attacks, Portscan attacks, replay attacks, Sybil attacks, man-in-the-middle attacks, identity theft attacks, traffic analysis attacks, masquerading attacks, session key disclosure attacks, public ledger attacks, denial of service attacks, strongand weak-collisions attacks, compromised server attacks, insider attacks, stolen smartcard attacks, offline password guessing attacks, impersonation attacks, message modification attacks, fake/bogus message attacks, reply attacks, Eclipse attacks, collusion attacks, quantum computing attacks, and stolen authenticator attacks; 2. Anonymity refers to the exchange of addresses and information realized by users in a blockchain system to interact without revealing their true identities.…”
Section: Blockchain Characteristics and Ad-vantagesmentioning
confidence: 99%
“…In addition, Xu et al's work [22] investigates anonymity in electric vehicles. Chen et al [23] explore the usage of blockchain regarding data sharing. But none of them suits the research in NFT.…”
Section: Related Workmentioning
confidence: 99%