2020
DOI: 10.1109/access.2020.2977048
|View full text |Cite
|
Sign up to set email alerts
|

Public Auditing Scheme With Identity Privacy Preserving Based on Certificateless Ring Signature for Wireless Body Area Networks

Abstract: The emergence of Wireless Body Area Networks (WBAN) provides users with ubiquitous wireless communication services, such as continuous exchange of medical information in real time. Therefore, WBAN is considered to be one of the effective wireless sensor technologies for improving medical services. However, the characteristics of WBAN make it subject to multiple attacks, such as the leakage of private information of users, and WBAN is also inefficient. In this paper, a certificateless ring signature scheme CLRS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Many RDIC schemes [16,18,19,22,23,35,36,39,[62][63][64][65][66] have been proposed based on CLPKC. He et al's [64] certificateless public auditing scheme for cloud-assisted WBANs is not a privacypreserving scheme.…”
Section: Remote Data Integrity Checking (Rdic) Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Many RDIC schemes [16,18,19,22,23,35,36,39,[62][63][64][65][66] have been proposed based on CLPKC. He et al's [64] certificateless public auditing scheme for cloud-assisted WBANs is not a privacypreserving scheme.…”
Section: Remote Data Integrity Checking (Rdic) Protocolsmentioning
confidence: 99%
“…In CLPKC, like IBC, the authenticity of the public key of an user is implicit; however, the full private key of an user is known only to that user. Recently, a number of CLPKC-based shared data auditing protocols have been proposed in the literature [16][17][18][19][20][21][22][23][24]39] for traditional cloud storage systems. However, these protocols cannot be directly adopted for a FOG-CPS because of its discriminating characteristics as discussed below.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the scheme is efficient in energy and cost and protects sensitive patient data from adversaries' attacks. In the scheme, [54] designed an efficient ring signature based on a certificateless environment to protect the patient's identity privacy. Furthermore, a public auditing technique is proposed for cloud-assisted BAN.…”
Section: Related Workmentioning
confidence: 99%
“…Certificateless authentication [29], [30] is one of the cryptographic techniques for authentication. Some authors proposed privacy-preserving integrity verification scheme [31], [32] using certificate-less ring signature which greatly reduces the computation cost during auditing. Li et al [19] proposed integrity checking of group shared data using certificateless signature.…”
Section: Introductionmentioning
confidence: 99%