2019
DOI: 10.1007/s11036-019-01215-9
|View full text |Cite
|
Sign up to set email alerts
|

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…First of all, people's sensitive data such as location privacy, identity privacy, and personal preferences are exposed to IoT. Then, if hackers control some components in IoT, it will not only damage people's property, but even threaten people's lives [7]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…First of all, people's sensitive data such as location privacy, identity privacy, and personal preferences are exposed to IoT. Then, if hackers control some components in IoT, it will not only damage people's property, but even threaten people's lives [7]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…In the field of wireless communications, mobile communications, or any other low-power communication systems, the power consumptions, computational cost, and communications overhead cause severe problems due to the restrictions of lightweight communication systems performance, especially for PKC cryptosystem. Many other approaches have proposed techniques that require the use of PKC to improve the security level in such lightweight communication systems [47], [48]. As depicted in both Table 2 and Figure 3, the computational cost of our scheme decreases compared to the computational costs in schemes [35]- [37].…”
Section: E Comparison Analysismentioning
confidence: 80%
“…Until recently, Shen et al [6] stated the importance of sensitive information hiding in detail and creatively proposed a remote auditing scheme supporting such essential attribute. The introduction of this scheme also brings some potential influence to other aspect, such as decreasing the overhead of the ciphertext query [33]- [36], and verification in the untrusted cloud server [37], [38]. However, we observe that three issues are not addressed well in their scheme.…”
Section: A Related Workmentioning
confidence: 94%