2018
DOI: 10.1016/j.future.2017.06.025
|View full text |Cite
|
Sign up to set email alerts
|

Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(21 citation statements)
references
References 23 publications
0
21
0
Order By: Relevance
“…(2) for i = 1 to n (3) for j = 1 to n (4) Determine the weight of edge from node vi to node vj based on the amount of connections of node vi. (5) end for (6) end for (7) for i = 1 to n (8) Set the weight of node vi in the initial stage as 1.…”
Section: Opinion Leader Election Methodsmentioning
confidence: 99%
“…(2) for i = 1 to n (3) for j = 1 to n (4) Determine the weight of edge from node vi to node vj based on the amount of connections of node vi. (5) end for (6) end for (7) for i = 1 to n (8) Set the weight of node vi in the initial stage as 1.…”
Section: Opinion Leader Election Methodsmentioning
confidence: 99%
“…A large number of authentication key exchange protocols have been proposed subsequently [2][3][4][5], as well as corresponding applications [6][7][8][9][10]. According to different application scenarios and assumptions, the authentication key exchange protocols are broadly divided into the following two categories: one assumes that each interacting party has a high-entropy private key which can be used to generate a high-entropy session key; the other one assumes that each interacting party only shares a weak password and generates a high-entropy session key through interaction.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of Internet of Things (IoT) [1,2] has greatly changed our daily life, especially in the electronic health (e-health) domain [3]. The patients with chronic diseases or severe illnesses are equipped with implanted or on the surface medical sensors to monitor various kinds of physiological data.…”
Section: Introductionmentioning
confidence: 99%
“…If S satisfies (A, ρ), U utilizes his secret key SK U and LSSS scheme to decrypt Υ and recover M .Otherwise, the algorithm outputs ⊥.Algorithm 11: EHR Decryption AlgorithmInput: P KP A, SKU with attribute set S, CT with access policy (A, ρ).Output: M/⊥. 1 if S satisfies (A, ρ) then 2Data user utilizes the LSSS scheme to find {λi ∈ Zp} i∈[n 1 ] such that i∈[n 1 ] λiAi = (1, 0, · · · , 0);3 Calculate Υ = C0/[e(C1, dU,4) · e(wP A,3, i∈[n 1 ] (dU,5,i) C 2,i ·λ i )]; M = SDec(CM , H0(Υ)); Return M/⊥.4.12. Keyword Match based Policy Update QueryIf the patient P A wants to update the access policy of the EHR ciphertext that are stored in the e-health big data system, he runs the keyword match based policy update query algorithm (shown in Algorithm 12) to generate a policy update query P U Q, which is submitted to the cloud platform.Suppose that the original access policy is (A, ρ) with A ∈ Z n1×n2 p and the update access policy is (A , ρ ) with A ∈ Z n 1 ×n 2 p…”
mentioning
confidence: 99%