Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417266
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Password-Hardened Encryption Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…• Signature Generation and Uploading: The physician responsible for the consultation sends an EMR to the patient to confirm the accuracy of the EMR. After receiving the EMR with the user's signature, the physician encrypts the EMR by [118] and signs it to ensure unforgeability based on AQ-ABS. In addition, a combination of IPFS and consortium blockchain is used to achieve secure EMR sharing.…”
Section: Privacy Of Storagementioning
confidence: 99%
“…• Signature Generation and Uploading: The physician responsible for the consultation sends an EMR to the patient to confirm the accuracy of the EMR. After receiving the EMR with the user's signature, the physician encrypts the EMR by [118] and signs it to ensure unforgeability based on AQ-ABS. In addition, a combination of IPFS and consortium blockchain is used to achieve secure EMR sharing.…”
Section: Privacy Of Storagementioning
confidence: 99%
“…(We remark that protecting the main application in case of passwords with low entropy is beyond the scope of this work. We refer the reader to [18], [43], [61], and [17] for more details.) Likewise, minor adjustments can be made to extend the technique to rings.…”
Section: B Application Of New Protocolsmentioning
confidence: 99%