2021
DOI: 10.1007/s11277-021-08636-4
|View full text |Cite
|
Sign up to set email alerts
|

Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights

Abstract: Research into a pandemic like Covid-19 needs a tremendous input of patient histories and characteristics. Patients and doctors are only willing to share these sensitive data when they are ensured that the data are solely used by legitimate research laboratories. Asymmetric group key agreement (AGKA) protocols provide a good cryptographic primitive to address this requirement. The AGKA protocols proposed in literature provide users with a common public group key and a different decryption key by relying on comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…New schemes are proposed in the literature [16][17][18][19][20][21][22][23][24] for the authentication part of the data sharing process. Xuan et al 16 proposed an optimized scheme for cross-domain authentication between heterogeneous IoT applications using certificate-less public key cryptography and smart contract technology.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…New schemes are proposed in the literature [16][17][18][19][20][21][22][23][24] for the authentication part of the data sharing process. Xuan et al 16 proposed an optimized scheme for cross-domain authentication between heterogeneous IoT applications using certificate-less public key cryptography and smart contract technology.…”
Section: Related Workmentioning
confidence: 99%
“…The capability of cross‐domain authentication is improved. Braeken 17 proposed a scheme to implement terminal self‐certified. In the scheme, users share the same private public key pair and use the Canetti–Krawczyk (CK) secure mutual authentication protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Main Algorithm. The scheme was designed based on Kim et al [51] and Braeken [52]. This scheme is mainly composed of five phases, each of which comprises a Setup Phase, Key Generation Phase, Group Agreement Phase, Data Storage Phase, and Data Broadcast Phase as shown in Figure 5.…”
Section: Proposed G2m Broadcast Proxy Reencryptionmentioning
confidence: 99%