2018
DOI: 10.1155/2018/2595273
|View full text |Cite
|
Sign up to set email alerts
|

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment

Abstract: With the application of sensor technology in the field of healthcare, online data sharing in healthcare industry attracts more and more attention since it has many advantages, such as high efficiency, low latency, breaking the geographical location, and time constraints. However, due to the direct involvement of patient health information, the privacy and integrity of medical data have become a matter of much concern to the healthcare industry. To retain data privacy and integrity, a number of digital signatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 51 publications
(32 citation statements)
references
References 28 publications
0
32
0
Order By: Relevance
“…Secret-key Public-key Signing Verifying [3] 1|G| 1|G| + 1| | 2|G| + + 3 3P + 1H [4] 1|G|+ 1| | 2| | 2|G| 2 + 2 ( + 3)exp + 2H [5] ( + 1)|G| 1|G|+ 1| | 2|G| 4 exp + 3 H 2 exp + 3P (3 + 1)H Ours 3|G|+ 1|G| 3|G|+ 1| | 3|G|+ (n + 3)|G| (2 + 9)exp + (2 + 1)H ( + 1)exp + 3P+(2 + 1)H time. Second, using direct approach [14,15], which leads to quite efficient resulted schemes (constant-size of both public parameters and signature, as well as efficient computing time); however these schemes are only secure under strong assumptions (generalization of the Diffie-Hellman exponent assumption, GDDHE assumption), although GDDHE assumption introduced by Boneh and Boyen at Eurocrypt'05 [16] now has been accepted widely by researchers [17][18][19][20][21][22].…”
Section: Signaturementioning
confidence: 99%
See 4 more Smart Citations
“…Secret-key Public-key Signing Verifying [3] 1|G| 1|G| + 1| | 2|G| + + 3 3P + 1H [4] 1|G|+ 1| | 2| | 2|G| 2 + 2 ( + 3)exp + 2H [5] ( + 1)|G| 1|G|+ 1| | 2|G| 4 exp + 3 H 2 exp + 3P (3 + 1)H Ours 3|G|+ 1|G| 3|G|+ 1| | 3|G|+ (n + 3)|G| (2 + 9)exp + (2 + 1)H ( + 1)exp + 3P+(2 + 1)H time. Second, using direct approach [14,15], which leads to quite efficient resulted schemes (constant-size of both public parameters and signature, as well as efficient computing time); however these schemes are only secure under strong assumptions (generalization of the Diffie-Hellman exponent assumption, GDDHE assumption), although GDDHE assumption introduced by Boneh and Boyen at Eurocrypt'05 [16] now has been accepted widely by researchers [17][18][19][20][21][22].…”
Section: Signaturementioning
confidence: 99%
“…In this scheme, each signer in an aggregating set signs a different message and then all those signatures are aggregated into a single short signature, which is called aggregate signature. As shown in [5,[23][24][25], aggregate signature can be applied well to several practical applications such as Bitcoin blockchain, Secure BGP protocol (SBGP) [26], Healthcare, and so on. Certificateless aggregate signature was first proposed in [27], since then it has been studied in numerous of papers such as [5,[28][29][30][31][32][33][34][35], to name a few.…”
Section: Signaturementioning
confidence: 99%
See 3 more Smart Citations