2015
DOI: 10.1109/tifs.2015.2414399
|View full text |Cite
|
Sign up to set email alerts
|

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
107
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 164 publications
(107 citation statements)
references
References 36 publications
0
107
0
Order By: Relevance
“…However, traditional digital signature techniques such as DSA require certificates to guarantee the authenticity of public key by Certification Authority, which is generally considered to be costly to use due to expensive certificate library management and maintenance problems. To eliminate the certificates, certificateless signature schemes [34], [35], [36], [37], [38] have been proposed based on the certificateless cryptography [39], [40]. In this paper, we present an efficient short signature scheme based on [34] and [36] to significantly reduce the storage and communication cost of signatures of verification objects.…”
Section: Signature and Authentication Of Ver-ification Objectmentioning
confidence: 99%
“…However, traditional digital signature techniques such as DSA require certificates to guarantee the authenticity of public key by Certification Authority, which is generally considered to be costly to use due to expensive certificate library management and maintenance problems. To eliminate the certificates, certificateless signature schemes [34], [35], [36], [37], [38] have been proposed based on the certificateless cryptography [39], [40]. In this paper, we present an efficient short signature scheme based on [34] and [36] to significantly reduce the storage and communication cost of signatures of verification objects.…”
Section: Signature and Authentication Of Ver-ification Objectmentioning
confidence: 99%
“…In this case, the transmission overload can be alleviated. Afterwards, Xiong and Qin proposed a certificateless encryption scheme and another certificateless signature scheme with efficient revocation against short-term key exposure in [40]. In 2016, Peng [1] designed an anonymous authentication protocol based on certificateless signature scheme, which provides conditional privacy and mutual authentication.…”
Section: Related Workmentioning
confidence: 99%
“…We consider an efficient personal health information (PHI) data sharing architecture [32,33] by an example that mobile patients featured with the same symptoms [3] or physicians can form a social group and can rent a cloud server to store and share PHI data with each other in a flexible access manner. Based upon the above premise, several different entities are involved in our system model ( Figure 2): PHI cloud storage server, trusted authority, decryption cloud server provider, trusted group administrator, and a large number of social group users including PHI data owners and PHI data sharers.…”
Section: System Modelmentioning
confidence: 99%