2020
DOI: 10.1109/tdsc.2018.2844814
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…Hohenberger and Waters [19] developed new "connect and correct" techniques for ABE that split the computation for key generation and encryption into two phases: a preparation phase that does the vast majority of the work to generate a secret key or encrypt a message, and a second phase can then rapidly assemble an ABE secret key or ciphertext when the specifics become known. Subsequently, based on this concept, Ma et al proposed an online/offline ABE with cryptographic reverse firewalls [20], a ciphertextpolicy attribute-based proxy re-encryption (CP-AB-PRE) [21], and efficient CP-ABE [22,23] with outsourced computation for various applications.…”
Section: Related Work 1dual-policy Abementioning
confidence: 99%
“…Hohenberger and Waters [19] developed new "connect and correct" techniques for ABE that split the computation for key generation and encryption into two phases: a preparation phase that does the vast majority of the work to generate a secret key or encrypt a message, and a second phase can then rapidly assemble an ABE secret key or ciphertext when the specifics become known. Subsequently, based on this concept, Ma et al proposed an online/offline ABE with cryptographic reverse firewalls [20], a ciphertextpolicy attribute-based proxy re-encryption (CP-AB-PRE) [21], and efficient CP-ABE [22,23] with outsourced computation for various applications.…”
Section: Related Work 1dual-policy Abementioning
confidence: 99%
“…However, it can't be directly applied in EMR sharing systems as it didn't consider the large volume of EMR. In order to realize data sharing with flexibility and efficient authority delegation for EMR system, Zhang et al 21 proposed a new access control model with ABE by utilizing the powerful computation capability of cloud. However, this model brought extra communication overhead for the system.…”
Section: Related Workmentioning
confidence: 99%
“…This issue has been documented in previous research. 52 Figure 1 depicts the verification process utilizing cryptographic techniques. There exist numerous techniques to safeguard data from interception during communication or local data exchange.…”
Section: Sadavarte Andmentioning
confidence: 99%