2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) 2016
DOI: 10.1109/iccpct.2016.7530286
|View full text |Cite
|
Sign up to set email alerts
|

QR code security using proxy re-encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Akhil et al [18] employed the technique of PRE to enhance the security of QR codes in 2016. A QR code is a machine-readable format that could be tampered with maliciously when being transmitted.…”
Section: Related Workmentioning
confidence: 99%
“…Akhil et al [18] employed the technique of PRE to enhance the security of QR codes in 2016. A QR code is a machine-readable format that could be tampered with maliciously when being transmitted.…”
Section: Related Workmentioning
confidence: 99%
“…In 2016, Akhil et al [ 22 ] applied the PRE scheme to QR code security and thus can provide efficient and secure data transmission between the sender and the receiver. In 2018, Zeng and Choo [ 23 ] introduced a conditional PRE scheme which could be utilized in secure cloud storage.…”
Section: Research Backgroundsmentioning
confidence: 99%
“…Numerous studies on QR Codes have been previously conducted, including research to improve the visual performance of QR by using the halftone method and the Berlekamp Reed-Solomon systematic error correction algorithm [12]. Many studies have attempted to increase the security of this QR code system by combining various techniques, such as adding a QR code layer [13], using proxy re-encryption [14], cryptography [15], [16], [17], watermarking [18], blockchain [19], and steganography [20]. A new type of QR code called two-level QR code (2LQR) has been introduced [21].…”
Section: Introductionmentioning
confidence: 99%