2021
DOI: 10.1109/jsac.2020.3020656
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(20 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…Notwithstanding, it is hard to decide the fitting encryption framework because of restricted power assets and computational abilities. In [ 16 ], the authors proposed an effective personality based appropriated unscrambling plan for the PHR framework that does not need to recreate the decoding key. Also, through proposed conspire, it is advantageous to impart their information to numerous gatherings.…”
Section: Literature Surveymentioning
confidence: 99%
“…Notwithstanding, it is hard to decide the fitting encryption framework because of restricted power assets and computational abilities. In [ 16 ], the authors proposed an effective personality based appropriated unscrambling plan for the PHR framework that does not need to recreate the decoding key. Also, through proposed conspire, it is advantageous to impart their information to numerous gatherings.…”
Section: Literature Surveymentioning
confidence: 99%
“…We emphasize that several other works propose schemes [ 17 – 23 ] that address different security aspects in electronic health record sharing. Some of these works focus only on sharing encrypted healthcare data, some examine secure communication for the healthcare system, and others focus on the authentication scheme for sharing healthcare records.…”
Section: Related Workmentioning
confidence: 99%
“…Authentication, key management, and access control are treated as two primary security services that are applied in various applications 34‐37 …”
Section: Review Of Blockchain Enabled Security Solutions For Personal...mentioning
confidence: 99%
“…Authentication, key management, and access control are treated as two primary security services that are applied in various applications. [34][35][36][37] In this section, we discuss various security schemes, which are applicable for blockchain enabled personal health records system (BIPHRS). After that, we provide the comparison of their security and functionality features.…”
Section: Review Of Blockchain Enabled Security Solutions For Personal...mentioning
confidence: 99%